[32259] in bugtraq
Re: WU-FTPD 2.6.2 Freezer
daemon@ATHENA.MIT.EDU (Seth Arnold)
Fri Oct 31 16:57:17 2003
Date: Fri, 31 Oct 2003 11:40:44 -0800
From: Seth Arnold <sarnold@wirex.com>
To: bugtraq@securityfocus.com
Message-ID: <20031031194044.GD27612@wirex.com>
Mail-Followup-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="vni90+aGYgRvsTuO"
Content-Disposition: inline
In-Reply-To: <20031031145543.19772.qmail@sf-www3-symnsj.securityfocus.com>
--vni90+aGYgRvsTuO
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Fri, Oct 31, 2003 at 02:55:43PM -0000, Angelo Rosiello wrote:
> for( i=3D0; i<loop; i++ )
> {
> write( sd, "LIST -w 1000000 -C\n", 19 );
> }
It is probably worth pointing out that it is FSF ls(1) at fault here;
wu-ftpd just provides a convenient way for potentially unauthenticated
users to DoS the machine. If your OS supports rlimits (ulimit(3)), I
believe they will provide reliable protection against this problem.
--=20
http://www.immunix.com/ secure Linux distributions and appliances
--vni90+aGYgRvsTuO
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE/orq8+9nuM9mwoJkRAgdOAJ9BKH1M6dHOB63SWQWdmJH9r4vMHgCgn5qx
g3SVe+lkRu0sQVKiQQwSFhU=
=IzZd
-----END PGP SIGNATURE-----
--vni90+aGYgRvsTuO--