_ RU.NETHACK (2:5077/15.22) _______________________________________ RU.NETHACK _
From : Ricky Lyte 2:5030/48.58 06 Dec 97 13:10:02
Subj : DOS (Windoze NT RAS PPTP exploit)
________________________________________________________________________________
AN> Кто pаскажет что затип атаки такой Denial of Service ?
Бомбаpдиpовка сеpвеpа-жеpтвы, пока или коньки не отбpосит, или пеpестанет
pеагиpовать на новые соединения.
Hебольшой пpимеp:
Date: Wed, 26 Nov 1997 11:48:13 -0600
From: Kevin Wormington <kworm@SOFNET.COM>
Subject: Potenial DOS in Windows NT RAS PPTP
Hi, this is my first posting so please excuse the style. Please forgive me
if this has been posted before, but I have not seen it. Also, I am unable
to test it with different hotfixes, etc.
I discovered that NT 4.0 w/SP3 and RAS PPTP is vulnerable to a DOS causing
core dump. I have been working with point to point tunnelling protocol and
discovered (by accident) that if you send a pptp start session request with
an invalid packet length in the pptp packet header that it will crash an NT
box.
Here is a very crude code fragment that will exploit this behaviour:
AN> Или вот еще вопpос : можно ли как-нибудь обойти shadowing
AN> ?
Об этом в следyющей мессаге.
Team Porno-Grafica
--- 1984!
* Origin: Welcome to the world of Emotional Degradation! (2:5030/48.58)
_ Hе ходи! Засекурят (2:5077/15.22) ______________________________ RU.SECURITY _
From : Stas Filshtinskiy 2:461/33.47 10 Jan 98 09:57:20
Subj : new DOS attack
________________________________________________________________________________
Приветствую тебя, All!
Вот почитайте ... опять ...
-----Original Message-----
From: Jiva DeVoe [SMTP:jiva@devware.com]
Sent: Thursday, January 08, 1998 7:53 PM
To: ntsecurity@iss.net
Subject: [NTSEC] New DOS exploit for NT and Win95 (CONFIRMED)
TO UNSUBSCRIBE: email "unsubscribe ntsecurity" to majordomo@iss.net
Contact ntsecurity-owner@iss.net for help with any problems!
---------------------------------------------------------------------------
This is just an FYI. I have confirmed and reproduced a new Denial of
Service exploit for Windows NT and Windows95. Under Windows NT this
exploit causes a proverbial BSOD, under Windows95, this causes an
exception in IFSMGR.VXD.
This exploit has been reported to Microsoft!
Details
Without putting out a blueprint of how to cause this. This is a
modified teardrop attack. (NOTE: This DOES affect machines patched
against teardrop) It utilizes UDP packets with altered headers. I have
also provided Microsoft with source code to this exploit.
Temporary Workaround
Any workaround that would have been implemented against teardrop should
work against this issue. By default, the UDP packets used in this
exploit are aimed at very high port numbers. So perhaps by blocking UDP
packets destined for high port numbers, you might be able to prevent
this attack. However, since it can be aimed at any port, a clever user
could get around filters such as this. I'd be happy to talk to anyone
about other alternatives for working around this issue.
Please feel free to repost this to NTBUGTRAQ (I'm not on that list) or
wherever else you choose.
-------------
Jiva DeVoe
MCSE
Devware Systems
jiva@devware.com
И еще
-----Original Message-----
From: Ken Williams [SMTP:jkwilli2@unity.ncsu.edu]
Sent: Friday, January 09, 1998 8:14 AM
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM; ntsecurity@iss.net
Subject: [NTSEC] bonk.c - modified teardrop attack that affects patched
NT and Win95
TO UNSUBSCRIBE: email "unsubscribe ntsecurity" to majordomo@iss.net
Contact ntsecurity-owner@iss.net for help with any problems!
---------------------------------------------------------------------------
here is the forwarded source code for the modified teardrop attack that
*supposedly* affects all patched NT and Win95 boxes.
bonk.c - 5/01/1998
Based On: teardrop.c by route|daemon9 & klepto
Crashes *patched* win95/(NT?) machines.
Basically, we set the frag offset > header length (teardrop
reversed). There are many theories as to why this works,
however i do not have the resources to perform extensive testing.
I make no warranties. Use this code at your own risk.
Rip it if you like, i've had my fun.