[9747] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Process table attack (from RISKS Digest)

daemon@ATHENA.MIT.EDU (Olle Segerdahl,D)
Tue Feb 23 12:27:28 1999

Date: 	Mon, 22 Feb 1999 18:33:34 +0100
Reply-To: olle@vattenfall.se
From: "Olle Segerdahl,D" <olle@VATTENFALL.SE>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <19990220134253.A14210@muscat.UCSC.EDU>

On Sat, 20 Feb 1999, Mark Boolootian wrote:

> The Process Table Attack is a [relatively] new kind of denial-of-service
> attack that can be waged against numerous network services on a variety of
> different UNIX systems. The attack is launched against network services
> which fork() or otherwise allocate a new process for each incoming TCP/IP
> connection.  Although the standard UNIX operating system places limits on
> the number of processes that any one user may launch, there are no limits on
> the number of processes that the superuser can create other than the hard
> limits imposed by the operating system. Since incoming TCP/IP connections
> are usually handled by servers that run as root, it is possible to
> completely fill a target machine's process table with multiple
> instantiations of network servers. Properly executed, this attack prevents
> any other command from being executed on the target machine.


How is this DoS different from the Old "rescource exaustion" attacks?

Anyone remember the "octopus" ? (keeping multiple sendmail-connections and
depriving the machine of either memory or proc#:s, whichever came first.)

I don't think it's fair to say it's "a [relatively] new kind of denial-of-service attack"

/olle

--
Above views are my own unless explicitly stated otherwise.
God is real, until declared integer.

home help back first fref pref prev next nref lref last post