[5042] in bugtraq
Re: mSQL vulnerabilities
daemon@ATHENA.MIT.EDU (Stacey Son)
Tue Jul 29 14:24:04 1997
Date: Mon, 28 Jul 1997 20:29:44 -0600
Reply-To: Stacey Son <sson@ISERVER.COM>
From: Stacey Son <sson@ISERVER.COM>
X-To: "Secure Networks Inc." <sni@silence.secnet.com>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: Your message of "Sun, 27 Jul 1997 19:13:23 MDT."
<Pine.BSI.3.96.970727191206.27761A-100000@silence.secnet.com>
Hi,
While fixing up all the buffer overrun problems in mSQL here is
another patch to fix the following quick and dirty DOS attack:
(1) telnet <your_favorite_msql_server> 1114
(2) type ^C (control C)
I have found this causes the server to dump and go away.
The patch (for version 2.0.1):
*** net.c.orig Mon Jul 28 14:19:30 1997
--- net.c Mon Jul 28 14:20:50 1997
***************
*** 120,127 ****
int fd;
{
u_char buf[4];
! int len,
! remain,
offset,
numBytes;
--- 120,127 ----
int fd;
{
u_char buf[4];
! u_int len;
! int remain,
offset,
numBytes;
Regards,
stacey@iserver.com
http://www.iserver.com