On Fri, 19 Oct 2001, George Metz wrote:

> The DoS attack has something to do with creating massive numbers of
> symlinks and then dereferencing them; I haven't tried the attack script on
> my LRP box yet, but I'm going to as soon as I finish upgrading my server
> to 2.4.12-ac3. Apparently, the DoS attack is still present in at least one
> customized 2.4.12 kernel, so be careful of that as well. A patch was
> presented for 2.2.19 for both vulnerabilities; if I find LRP 2.9.8
> vulnerable, I'll be compiling the patch in and will make it available.

***UPDATE***

The sequence for the DoS attack is to take a file, mklink.sh, and execute
it, thereby making a number of very "deep" symlinks, then doing a "head
l0" - l0 being one of the symlinks created. I just decided to test this on
my LRP box, and it rebooted itself after about 45 seconds to a minute.
Surprised me when it did, too. While the "head" process was running, I saw
a tiny bit of latency in loading a webpage, but there was no noticeable
change in the pingtimes I was receiving.

Working on this; will let everyone know later what the word is.

--
George Metz
Commercial Routing Engineer
[EMAIL PROTECTED]

"We know what deterrence was with 'mutually assured destruction' during
the Cold War. But what is deterrence in information warfare?" -- Brigadier
General Douglas Richardson, USAF, Commander - Space Warfare Center


_______________________________________________
Leaf-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-devel

Reply via email to