[12821] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Multiples Remotes DoS Attacks in MDaemonServer

daemon@ATHENA.MIT.EDU (Nobuo Miwa)
Thu Dec 2 14:55:32 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <199912011604.HJI39569.BX-NOJ@lac.co.jp>
Date:         Wed, 1 Dec 1999 16:04:08 -0500
Reply-To: Nobuo Miwa <n-miwa@LAC.CO.JP>
From: Nobuo Miwa <n-miwa@LAC.CO.JP>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <MDAEMON-F199911301617.AA172323md50000081568@altn.com>

Hi,

> Another issue related to 350 simultaneous MDConfig connections has
> recently surfaced at ASCII Japan.  MDaemon can be configured to allow
> secure MDConfig connections which will prevent this problem from ever
> occurring.  This can be done now, however the 11/30/99 full patch will
> contain additional coding to prevent such a problem from occuring in
> the event that the system admin has left the port wide open for anyone
> to exploit.

I can't see that patch. And besides,it is NOT affected only on MDConfig
port. I can see same problem on POP port.
So, all MDaemon 2.8.5 users should use that patch for preventing
that too much connect() DoS. Not just MDConfig port.

Nobuo Miwa

<Nobuo Miwa> n-miwa@lac.co.jp  ( @ @ ) http://www.lac.co.jp/security/
--------------------------o00o--(. .)--o00o--------------------------

home help back first fref pref prev next nref lref last post