Re: DoS in Shells: was Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-04 Thread Kurt Seifried
This is, to put it politely, incredibly old news. Let's face it, if you give a user a shell acount, with no restrictions on CPU time or memory usage, yes, they will be able to suck up as much resources as the computer can spare (this is, among other reasons why "nice" exists). I advise you place li

Re: DoS in Shells: was Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-04 Thread Kurt Seifried
This is, to put it politely, incredibly old news. Let's face it, if you give a user a shell acount, with no restrictions on CPU time or memory usage, yes, they will be able to suck up as much resources as the computer can spare (this is, among other reasons why "nice" exists). I advise you place l

Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-04 Thread martin f krafft
also sprach Alun Jones <[EMAIL PROTECTED]> [2002.04.04.0445 +0200]: > > DenyFilter \*.*/ > > Just as a quick question, why not deny the string "/../" (you may have to > deny the regex "/\.\./", depending how the filter in question works)? quick answer: because i merely copied the fix from the s

Re: DoS in Shells: was Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-04 Thread Chip McClure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Also tested, and vulnerable on: FreeBSD 4.5-RELEASE FreeBSD 4.5-RELEASE #0: Mon Jan 28 14:31:56 GMT 2002 [EMAIL PROTECTED]:/usr/src/sys/compile/GENERIC i386 Tested using the shells bash, csh, ksh, zsh. Chip - - Chip McClure Sr. Unix Administra

Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-04 Thread martin f krafft
also sprach Alun Jones <[EMAIL PROTECTED]> [2002.04.04.0445 +0200]: > > DenyFilter \*.*/ > > Just as a quick question, why not deny the string "/../" (you may have to > deny the regex "/\.\./", depending how the filter in question works)? quick answer: because i merely copied the fix from the

Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-04 Thread Justin Shore
On 3/29/02 3:40 PM martin f krafft said... >dear bugtraq'ers, > >i must confess that the information i provided wrt the acclaimed DoS >exploit in Debian potato's proftpd package (1.2.0pre10-2.0potato1) was >not fully accurate. the package *does in fact contain a buggy daemon* >despite having been

Re: DoS in Shells: was Re: DoS in debian (potato) proftpd:1.2.0pre10-2.0potato1

2002-04-04 Thread Chip McClure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Also tested, and vulnerable on: FreeBSD 4.5-RELEASE FreeBSD 4.5-RELEASE #0: Mon Jan 28 14:31:56 GMT 2002 [EMAIL PROTECTED]:/usr/src/sys/compile/GENERIC i386 Tested using the shells bash, csh, ksh, zsh. Chip - - Chip McClure Sr. Unix Administr

Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-04 Thread Justin Shore
On 3/29/02 3:40 PM martin f krafft said... >dear bugtraq'ers, > >i must confess that the information i provided wrt the acclaimed DoS >exploit in Debian potato's proftpd package (1.2.0pre10-2.0potato1) was >not fully accurate. the package *does in fact contain a buggy daemon* >despite having been

DoS in Shells: was Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-03 Thread reaktor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello All, I can confirm that the ls strings dos' slackware 8.0. Causes shell process of that user (user or root) to chew up the cpu until the shell terminates on sig 11. Works on any shell the user is using, csh, ksh, bash Tested on: Linux 2.2.1

DoS in Shells: was Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-03 Thread reaktor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello All, I can confirm that the ls strings dos' slackware 8.0. Causes shell process of that user (user or root) to chew up the cpu until the shell terminates on sig 11. Works on any shell the user is using, csh, ksh, bash Tested on: Linux 2.2.1

Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-03 Thread Alun Jones
At 03:40 PM 3/29/2002, martin f krafft wrote: ls */../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../* ... DenyFilter \*.*/ Just as a quick question, why not deny the string "/../" (you may have to deny the regex "/\.\./", depending how the filter in question works)? As far a

Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-04-03 Thread Alun Jones
At 03:40 PM 3/29/2002, martin f krafft wrote: > ls */../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../* ... > DenyFilter \*.*/ Just as a quick question, why not deny the string "/../" (you may have to deny the regex "/\.\./", depending how the filter in question works)? As far as

Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-03-29 Thread martin f krafft
dear bugtraq'ers, i must confess that the information i provided wrt the acclaimed DoS exploit in Debian potato's proftpd package (1.2.0pre10-2.0potato1) was not fully accurate. the package *does in fact contain a buggy daemon* despite having been fixed, according to the changelog: proftpd (1.2

Re: DoS in debian (potato) proftpd: 1.2.0pre10-2.0potato1

2002-03-29 Thread martin f krafft
dear bugtraq'ers, i must confess that the information i provided wrt the acclaimed DoS exploit in Debian potato's proftpd package (1.2.0pre10-2.0potato1) was not fully accurate. the package *does in fact contain a buggy daemon* despite having been fixed, according to the changelog: proftpd (1.