On 1 Mar 2002 at 10:23, [EMAIL PROTECTED] wrote:

> c) Denial Of Service.(Exploit Released)

Testes the 'Exploit' against our Raq4i (fully patched):

<begin output>

    C:\downloads>perl -x Cobalt_dos.pl -s xxx.xxx.xxx.xxx

    Cobalt RAQ DoS v4.0 DoS exploit (c)2002.
    Alex Hernandez [EMAIL PROTECTED]


    Crash was successful !

</end output>

Tried connecting to admin interface - no problem - still there.

'Crash Successful !' - the Perl script is written to ouput this no matter what happens 
- not very well 
written 'exploit'.

Logs show:

xxx.xxx.xxx.xxx - - [01/Mar/2002:14:30:26 +0000] "GET /cgi-
bin/.cobalt/alert/service.cgi?service=AAA..<snip lots of A's>..AAA" 414 271
xxx.xxx.xxx.xxx - - [01/Mar/2002:14:30:45 +0000] "GET /.cobalt/sysManage/index.html 
HTTP/1.1" 401 
849

The important bits from this are:

414 - Request To Long

then

401 - Unathorized.

So the question is - have they tested this 'exploit' on an unpatched or patched 
version of the Raq4.

This 'DOS' seems to rely on anonymous logins to the admin interfaces as well.  hmmm... 
 Does anyone 
here actually allow that ?

Ian




_______________________________________________
cobalt-security mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-security

Reply via email to