lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: kruse at krusesecurity.dk (Peter Kruse)
Subject: SV: Does the Windows AUX bug affect Web servers also?

Hi Richard,

AFAIK it can?t be done with a http://www.someserver./aux but there?re
several other ways to exploit this DoS. 

It can be done over network shares and anywhere we include HTML and
scripts (webpages, e-mails, internal documents and so on). I have
succesfully crashed a server placering a "COMn" reference in a special
folder. We had to remove the reference with a Windows 2000 bootdisk.

Other browsers are affected as well and at least two (of my knowledge)
are hit a lot harder than IE. They both cause the system to crash.

Med venlig hilsen // Kind regards

Peter Kruse
Kruse Security
http://www.krusesecurity.dk

-----Oprindelig meddelelse-----
Fra: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] P? vegne af Richard M.
Smith
Sendt: 9. juli 2003 18:50
Til: full-disclosure@...ts.netsys.com
Emne: [Full-Disclosure] Does the Windows AUX bug affect Web servers
also?


Is it possible to also crash a Web server hosted on a Windows box using
a URL something like:

    http://www.somebody.com/aux

If this particular URL is okay, maybe there are other URLs that will
cause a crash.  For example, POSTing a form to a URL containing AUX.

This problem could be in any Windows Web server such as IIS, Apache,
ColdFusion, etc..

(I don't have access to a Windows Web server to try this out myself.)

Richard

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
xc3ed@...eaker.net
Sent: Wednesday, July 09, 2003 7:39 AM
To: full-disclosure@...ts.netsys.com
Cc: KF
Subject: Re: [Full-Disclosure] Internet Explorer 6 DoS Bug


duplicated in Windows 2003 Server, datacenter edition, IE v6.0.3790.0

regards, xsr

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ