[9283] in bugtraq

home help back first fref pref prev next nref lref last post

Re: oshare testing

daemon@ATHENA.MIT.EDU (Aleph One)
Thu Jan 28 14:39:07 1999

Date: 	Thu, 28 Jan 1999 09:41:24 -0800
Reply-To: Aleph One <aleph1@UNDERGROUND.ORG>
From: Aleph One <aleph1@UNDERGROUND.ORG>
To: BUGTRAQ@NETSPACE.ORG

A summary of the replies from people testing the oshare program against
different versions of Windows:

Reported Vulnerable  (Crash):

Windows 95		Nicu Pavel <panic@radiohit.ro>
Windows 95		"C.J. Oster" <lordvadr@pobox.com>
Windows 95 + USB	kpavlov@srgtampa.com
Windows 95 OSR2		Nicu Pavel <panic@radiohit.ro>
Windows 95 Japanese	sen_ml@eccosys.com
Windows 95 DK attack from Linux 2.2.0, 2.0.36 and SunOS 4.1.4		nino@inform.dk
Windows 95 UK attack from Linux 2.2.0, 2.0.36 and SunOS 4.1.4		nino@inform.dk
Windows 98		Nicu Pavel <panic@radiohit.ro>
Windows 98		maniac@JADIERKO.LOCALHOST.SK
Windows 98 Japanese	sen_ml@eccosys.com
Windows 98 UK attack from Linux 2.2.0, 2.0.36 and SunOS 4.1.4		nino@inform.dk

Reported Vulnerable (Frozen, no BSOD):

Windows 98 4.10.1998 all windowsupdate patches.	Launched attack from Linux.	"Keith Warno" <keith.warno@iname.com>

Reported Vulnerable (Frozen until packets stop):

Windows 98		"C.J. Oster" <lordvadr@pobox.com>
Windows 98		Vanja Hrustic <vanja@SIAMRELAY.COM>

Reported Not Vulnerable:

Windows 98 English		sen_ml@eccosys.com
Windows 98 tested from Linux	tsd@Cal001307.student.utwente.nl	
Window NT 4.0 SP3		maniac@JADIERKO.LOCALHOST.SK
Windows NT 4.0 SP4 Japanese	sen_ml@eccosys.com
Linux 2.0.36			maniac@JADIERKO.LOCALHOST.SK

Someone also mentioned that Linux (2.0.36) replaces the ip total length
field with 40, the actual ip-packet length (as seen by pcap).


--
Aleph One / aleph1@underground.org
http://underground.org/
KeyID 1024/948FD6B5
Fingerprint EE C9 E8 AA CB AF 09 61  8C 39 EA 47 A8 6A B8 01

home help back first fref pref prev next nref lref last post