>We had to remove the reference with a Windows 2000 bootdisk.

actually you don't have to do this you can "trick" windows by using a UNC
path

you can delete the file by typing

del \\.\C:\COM1

or create a file with an invalid filename like this :

echo bla > \\.\C:\COM1

-- jelmer





----- Original Message ----- 
From: "Peter Kruse" <[EMAIL PROTECTED]>
To: "'Richard M. Smith'" <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Wednesday, July 09, 2003 8:42 PM
Subject: SV: [Full-Disclosure] Does the Windows AUX bug affect Web servers
also?


> Hi Richard,
>
> AFAIK it can�t be done with a http://www.someserver./aux but there�re
> several other ways to exploit this DoS.
>
> It can be done over network shares and anywhere we include HTML and
> scripts (webpages, e-mails, internal documents and so on). I have
> succesfully crashed a server placering a "COMn" reference in a special
> folder. We had to remove the reference with a Windows 2000 bootdisk.
>
> Other browsers are affected as well and at least two (of my knowledge)
> are hit a lot harder than IE. They both cause the system to crash.
>
> Med venlig hilsen // Kind regards
>
> Peter Kruse
> Kruse Security
> http://www.krusesecurity.dk
>
> -----Oprindelig meddelelse-----
> Fra: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] P� vegne af Richard M.
> Smith
> Sendt: 9. juli 2003 18:50
> Til: [EMAIL PROTECTED]
> Emne: [Full-Disclosure] Does the Windows AUX bug affect Web servers
> also?
>
>
> Is it possible to also crash a Web server hosted on a Windows box using
> a URL something like:
>
>     http://www.somebody.com/aux
>
> If this particular URL is okay, maybe there are other URLs that will
> cause a crash.  For example, POSTing a form to a URL containing AUX.
>
> This problem could be in any Windows Web server such as IIS, Apache,
> ColdFusion, etc..
>
> (I don't have access to a Windows Web server to try this out myself.)
>
> Richard
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> [EMAIL PROTECTED]
> Sent: Wednesday, July 09, 2003 7:39 AM
> To: [EMAIL PROTECTED]
> Cc: KF
> Subject: Re: [Full-Disclosure] Internet Explorer 6 DoS Bug
>
>
> duplicated in Windows 2003 Server, datacenter edition, IE v6.0.3790.0
>
> regards, xsr
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to