lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050323013331.17428.qmail@mail2.securityfocus.com>
Date: Tue, 22 Mar 2005 20:46:15 -0500
From: "Peter Oswald" <peteoswald@...cast.net>
To: "'azurIt'" <azurit@...ox.sk>
Cc: <bugtraq@...urityfocus.com>
Subject: RE: Possible windows+python bug


Perhaps the disabling of raw sockets in SP2 is the cause of this problem.
Try this.

Net stop SharedAccess

Then try running the Python code and see if it still crashes.

Afterwards you can restart the SharedAccess service. Cheers.

-----Original Message-----
From: azurIt [mailto:azurit@...ox.sk] 
Sent: Tuesday, March 22, 2005 5:06 PM
To: bugtraq@...urityfocus.com
Subject: Re: Possible windows+python bug



> On Tue, Mar 22, 2005 at 12:21:18PM -0000, liquid@...erspace.org 
wrote:
> > Start Python and type (of course x.x.x.x should be replaced with
> > IP address):
> > 
> > import socket
> > s=socket.socket(socket.AF_INET,socket.SOCK_RAW,4)
> > s.sendto("",("x.x.x.x",0))
> > 
> > Press ENTER and your win box should crash immediately.
> 
> I tested this on WinXP SP2 with Python 2.4.  The result is an
> exception:
> 
>   socket.error: (10022, 'Invalid argument')
> 
> I don't have Python 2.3 installed otherwise I would test that too.
> 
>   Neil
> 


i got the same exception, WinXP SP2, Python 2.3.4 .

azurIt

_______________________________________________________________________
http://www.epi.sk Ekonomicke a pravne informacie - denne aktualizovane.
Zakony, sutaze, udaje o firmach, odborne clanky...
Najdete na stranke http://www.epi.sk/info1.htm



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ