[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[bug-inetutils] telnetd bug: Busy loop in io_drain can be abused for DOS
From: |
Petr Malát |
Subject: |
[bug-inetutils] telnetd bug: Busy loop in io_drain can be abused for DOS attack |
Date: |
Wed, 22 Aug 2012 12:59:00 +0200 |
Hello again,
I found a problem in telnet demon in a function, which waits for reply
from client. The problem is that it calls read() on non-blocking
filedescriptor in a loop, until some data comes. If the client is evil
and does not send a reply, but keeps the connection open, then server
is calling read() again and again consuming CPU time. The problem can
be solved by calling select() before reading from filedescriptor.
Patch is attached.
Petr
PS: I'm not subscribed to the mailing list, please respond also on my address.
io_drain.patch
Description: Binary data
- [bug-inetutils] telnetd bug: Busy loop in io_drain can be abused for DOS attack,
Petr Malát <=