You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@apr.apache.org by Luke Kenneth Casson Leighton <lk...@samba-tng.org> on 2001/07/16 16:31:00 UTC

[ajv@E-SECURE.COM.AU: Re: Remote DoS attack against SSH Secure Shell for Windows Servers Vulnerability]

uh... just in case you hadn't seen this.  i'm forwarding it
because i think it might be relevant.

all best,

luke

----- Forwarded message from Andrew van der Stock <aj...@E-SECURE.COM.AU> -----

Delivered-To: lkcl@angua.rince.de
Delivered-To: lkcl@samba.org
Approved-By: Russ.Cooper@RC.ON.CA
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2462.0000
Importance: Normal
Date:         Mon, 16 Jul 2001 19:47:56 +1000
From: Andrew van der Stock <aj...@E-SECURE.COM.AU>
Subject:      Re: Remote DoS attack against SSH Secure Shell for Windows
              Servers Vulnerability
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
In-Reply-To:  <NC...@ussrback.com>

Almost every program using MS's C Runtime library for select() will suffer
from this problem. This vulnerability is only a problem if it listens on a
port. For example, nslookup.exe from Microsoft uses a whole bunch of CRT
calls, including select(), but doesn't listen on any ports.

Look for programs that use select(), and load msvcrt.dll (or close
relations, and/or statically link with them). The CRT has been known broken
for a long time.

If you port programs from Unix-land, please do yourselves a favor, and
change code that relies heavily on select() or poll() to use native winsock
async I/O. Not only do you get far higher throughput, it's likely that you
will be far more robust.

Andrew

-----Original Message-----
From: Windows NTBugtraq Mailing List
[mailto:NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM]On Behalf Of USSR Labs
Sent: Friday, 16 March 2001 05:42
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: Remote DoS attack against SSH Secure Shell for Windows Servers
Vulnerability
Importance: High


[snip]
Topic:              Remote DoS attack against SSH Secure Shell for
Windows Servers Vulnerability

----------------------------------------------------------------------------
Delivery co-sponsored by Trend Micro
============================================================================
TREND MICRO REAL-TIME VIRUS ALERTS
If you would like to know about a virus outbreak before CNN and ZDNet get
Trend Micro Virus Info Feed FREE. Simply copy and paste a small piece of
code to give your visitors a real-time top 10 list and the latest virus
advisories. Setup takes just 10 minutes and requires no server-side code on
your Web site. All content is updated automatically from Trend Micro's Web
site.
http://www.antivirus.com/banners/tracking.asp?si=8&bi=237&ul=/syndication/
vinfo/
----------------------------------------------------------------------------

----- End forwarded message -----