[19738] in bugtraq

home help back first fref pref prev next nref lref last post

Re: oops, previous message broken

daemon@ATHENA.MIT.EDU (=?iso-8859-2?q?=A3ukasz?= Grochal)
Tue Mar 20 21:26:19 2001

MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2
Content-Transfer-Encoding: 8bit
Message-ID:  <87pufdob6d.fsf@larch-iii.priv.rotfl.eu.org>
Date:         Mon, 19 Mar 2001 19:39:38 +0100
Reply-To: =?iso-8859-2?q?=A3ukasz?= Grochal <lukie@ROTFL.EU.ORG>
From: =?iso-8859-2?q?=A3ukasz?= Grochal <lukie@ROTFL.EU.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20010317151927.A5697@RoEdu.NET> (Stefan Laudat's message of
              "Sat, 17 Mar 2001 15:19:27 +0200")

Stefan Laudat <stefan@ROEDU.NET> writes:

> oops, fixed version attached...

Nice try... now examine the loop in which fork() is called. the first
instance calls 30 processes, which in turn call 29, 28... and so on
children. In effect you generate a pretty nice DoS on both source
and victim hosts. I guess adding a simple exit(0); after ftp->quit();
wouldn't be a bad thing.

Regards,

--
(-) Łukasz Grochal                                  lukie@rotfl.eu.org
                                                  (for PGP key visit:)
_____________________________________________ http://www.rotfl.eu.org/ __
... all in all it's just another rule in the firewall.       /Ping Flood/

home help back first fref pref prev next nref lref last post