[15161] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Remote DoS attack in Real Networks Real Server (Strike

daemon@ATHENA.MIT.EDU (Jeff Long)
Fri Jun 2 16:02:02 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <3937DA02.44D2882@kestrel.cc.ukans.edu>
Date:         Fri, 2 Jun 2000 11:00:02 -0500
Reply-To: Jeff Long <long@KESTREL.CC.UKANS.EDU>
From: Jeff Long <long@KESTREL.CC.UKANS.EDU>
X-To:         Ussr Labs <labs@USSRBACK.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

Ussr Labs wrote:

> Remote DoS attack in Real Networks Real Server (Strike #2)
> Vulnerability

> Real Networks Real Server 7 Windows NT/2000

> Real Networks Real Server 7.01 Windows NT/2000

> The Ussr Labs team has recently discovered a memory problem in the
> RealServer 7 Server (patched and non-patched).
>
> What happens is, by performing an attack sending specially-malformed
> information to the RealServer HTTP Port(default is 8080), the process
> containing the services will stop responding.
>
> The Exploit:
> It will take down the RealServer causing it to stop all streaming
> media brodcasts, making it non-functional, (untill Reboot)
>
> Example:
> With the RealServer server running on 'Port' (default being 8080) the
> syntax to do the D.O.S. attack is:
>
> http://ServerIp:Port/viewsource/template.html?
>
> And Real Server will Stop Responding.

Apparently Real Server 7.02 fixes this problem (at least on NT Server
4.0 SP6a).  I was able to verify this exploit on 7.01 but after
upgrading to 7.02 this no longer occurs.  Note, that for the upgrade to
be effective you must reboot NT for it to work otherwise it will still
hang.

Jeff Long

home help back first fref pref prev next nref lref last post