RE: IPv4 fragmentation --> The Rose Attack

From: Taylan Develioglu (percival_at_devnull.nl)
Date: 04/12/04

  • Next message: Janek Vind: "[waraxe-2004-SA#016 - Cross-Site Scripting aka XSS in phpnuke 6.x-7.2 part 3]"
    To: <bugtraq@securityfocus.com>
    Date: Mon, 12 Apr 2004 13:21:05 +0200
    
    

    Has anyone tried setting /proc/sys/net/ipv4/ipfrag_low_thresh on linux ?

    This should minimize memory usage for packet reassembly, and may be an easy
    workaround.

    Taylan


  • Next message: Janek Vind: "[waraxe-2004-SA#016 - Cross-Site Scripting aka XSS in phpnuke 6.x-7.2 part 3]"