Full Disclosure mailing list archives

OS X DirectoryService DoS {@stake adv: a041003-1}


From: Neeko Oni <neeko () haackey com>
Date: Tue, 15 Apr 2003 17:06:48 -0700 (PDT)

(Ref: www.atstake.com/research/advisories/2003/a041003-1.txt)
(MacOS X DirectoryService Privilege Escalation and DoS attack)

From the advisory:
In order for an attacker to exploit this vulnerability, they must
first cause DirectoryServices to terminate.  This can be done by
simply connecting to port 625 repeatedly using an automated program. 

Ok, the PATH problem is self-explanatory (and has been exploited once
the DirectoryService process has crashed) but I've had some difficulty
reproducing the DoS attack claim.  I've got a 10.2.4 machine sitting
right next to me, I believe it's a stock install, but DirectoryService
doesn't bind 625.  DirectoryService doesn't bind any ports and
furthermore nothing binds 625 at all.

Has anyone reproduced the DoS in that advisory?


.Neeko Oni [neeko () haackey com]
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: