Bugtraq mailing list archives
Re: mSQL vulnerabilities
From: sson () ISERVER COM (Stacey Son)
Date: Mon, 28 Jul 1997 20:29:44 -0600
Hi,
While fixing up all the buffer overrun problems in mSQL here is
another patch to fix the following quick and dirty DOS attack:
(1) telnet <your_favorite_msql_server> 1114
(2) type ^C (control C)
I have found this causes the server to dump and go away.
The patch (for version 2.0.1):
*** net.c.orig Mon Jul 28 14:19:30 1997
--- net.c Mon Jul 28 14:20:50 1997
***************
*** 120,127 ****
int fd;
{
u_char buf[4];
! int len,
! remain,
offset,
numBytes;
--- 120,127 ----
int fd;
{
u_char buf[4];
! u_int len;
! int remain,
offset,
numBytes;
Regards,
stacey () iserver com
http://www.iserver.com
Current thread:
- mSQL vulnerabilities Secure Networks Inc. (Jul 27)
- Re: mSQL vulnerabilities Stacey Son (Jul 28)
- <Possible follow-ups>
- Re: mSQL vulnerabilities David Sacerdote (Jul 28)
- Re: mSQL vulnerabilities David Sacerdote (Jul 29)
- Re: mSQL vulnerabilities Black Adder (Jul 29)
