[19738] in bugtraq
Re: oops, previous message broken
daemon@ATHENA.MIT.EDU (=?iso-8859-2?q?=A3ukasz?= Grochal)
Tue Mar 20 21:26:19 2001
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2
Content-Transfer-Encoding: 8bit
Message-ID: <87pufdob6d.fsf@larch-iii.priv.rotfl.eu.org>
Date: Mon, 19 Mar 2001 19:39:38 +0100
Reply-To: =?iso-8859-2?q?=A3ukasz?= Grochal <lukie@ROTFL.EU.ORG>
From: =?iso-8859-2?q?=A3ukasz?= Grochal <lukie@ROTFL.EU.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <20010317151927.A5697@RoEdu.NET> (Stefan Laudat's message of
"Sat, 17 Mar 2001 15:19:27 +0200")
Stefan Laudat <stefan@ROEDU.NET> writes:
> oops, fixed version attached...
Nice try... now examine the loop in which fork() is called. the first
instance calls 30 processes, which in turn call 29, 28... and so on
children. In effect you generate a pretty nice DoS on both source
and victim hosts. I guess adding a simple exit(0); after ftp->quit();
wouldn't be a bad thing.
Regards,
--
(-) Łukasz Grochal lukie@rotfl.eu.org
(for PGP key visit:)
_____________________________________________ http://www.rotfl.eu.org/ __
... all in all it's just another rule in the firewall. /Ping Flood/