[26835] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Fwd: stream.c - new FreeBSD exploit?

daemon@ATHENA.MIT.EDU (Allan Carscaddon)
Thu Jan 20 15:04:30 2000

Message-Id: <4.2.2.20000120150120.00b53b30@carscaddon.com>
Date: Thu, 20 Jan 2000 15:01:51 -0500
To: Joe Shaw <jshaw@insync.net>,
	"Henry R. Linneweh" <linneweh@concentric.net>
From: Allan Carscaddon <allan@carscaddon.com>
Cc: nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu


Fresh from BUGTRAQ:

>Approved-By: aleph1@SECURITYFOCUS.COM
>Delivered-To: bugtraq@lists.securityfocus.com
>Delivered-To: bugtraq@securityfocus.com
>Date:         Tue, 18 Jan 2000 14:44:38 -0800
>Reply-To: The Tree of Life <ttol@JAMES.KALIFORNIA.COM>
>Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
>From: The Tree of Life <ttol@JAMES.KALIFORNIA.COM>
>Subject:      stream.c - new FreeBSD exploit?
>X-To:         bugtraq@securityfocus.com
>To: BUGTRAQ@SECURITYFOCUS.COM
>X-Loop-Detect: 1
>
>I've been informed today by an irc admin that a new exploit is circulating
>around.  It "sends tcp-established bitstream shit" and makes the "kernel
>fuck up".
>
>It's called stream.c.
>
>The efnet ircadmin told me servers on Exodus (Exodus Communications) were 
>being
>hit and they managed to get a hold of the guy.  When asked what was going
>on, he just said "stream.c".
>
>When I talked to another person to ask if he had 'acquired' the source, he
>said he wasn't going to give it out.  I asked him if he had a patch for it,
>and he replied "the fbsd team is working on it.  No patch is available right
>now."
>
>What's the importance of this?  Major companies such as Yahoo
>(www.yahoo.com) and others run freebsd.
>
>According to the irc admin, a simple reboot fixes it.  "Your box reboots or
>dies."  He also stated, when asked if anything noticeable happened, that
>"nothing unusual [happened]".
>
>The only log that he could provide was this one:
>
>---snip---
>
>syslog:Jan 18 12:30:36 x kernel: Kernel panic: Free list empty
>
>---snip---
>
>One thing of note:  he also stated this happened on non-freebsd systems,
>which is contrary to what the other person said, who was "under the
>impression it was freebsd specific."
>
>I have the source, which I'm not going to post for 2-3 days (give time for
>fbsd to work on the fix).  If it isn't out before the 21st, I'll post it up.
>
>---snip---
>
>void usage(char *progname)
>{
>    fprintf(stderr, "Usage: %s <dstaddr> <dstport> <pktsize> <pps>\n",
>progname);
>    fprintf(stderr, "    dstaddr  - the target we are trying to attack.\n");
>    fprintf(stderr, "    dstport  - the port of the target, 0 = random.\n");
>    fprintf(stderr, "    pktsize  - the extra size to use.  0 = normal
>syn.\n");
>    exit(1);
>}
>
>---snip---
>
>Thanks for listening to my ramblings, hope everything I said helps.
>
>- ttol
>http://www.alladvantage.com/home.asp?refid=AME389
>Get Paid to Surf.  It works actually, cause people get thousands of dollars
>a month from it...it's neet :P  My id is AME389 - use it! :)



home help back first fref pref prev next nref lref last post