[FRIAM] alternative response

Steve Smith sasmyth at swcp.com
Wed Jun 17 11:12:58 EDT 2020


> Ha! 14648!

That explains a LOT.  A DOS attack against FriAM
<https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14648.html>,
leading to excess CPU consumption...

    Description
    A flaw was found in 389 Directory Server. A specially crafted search
    query
    could lead to excessive CPU consumption in the do_search() function. An
    unauthenticated attacker could use this flaw to provoke a denial of
    service.

I KNEW that the universe ran on Ubuntu

or is this just another one-to-many conflation?



>
>
>
> --
> Sent from: http://friam.471366.n2.nabble.com/
>
> - .... . -..-. . -. -.. -..-. .. ... -..-. .... . .-. .
> FRIAM Applied Complexity Group listserv
> Zoom Fridays 9:30a-12p Mtn GMT-6  bit.ly/virtualfriam
> un/subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
> archives: http://friam.471366.n2.nabble.com/
> FRIAM-COMIC http://friam-comic.blogspot.com/ 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://redfish.com/pipermail/friam_redfish.com/attachments/20200617/15dfd835/attachment.html>


More information about the Friam mailing list