TUCoPS :: Unix :: General :: bt174.txt

eServ Memory Leak Solution


After discussion with Andrey Cherezov, the cause and solution of the eServ=

memory "leak" has been identified=2E  Delayed de-allocation associated wit=
h
thread creation and destruction caused the issue=2E  eServ 2=2E9x was
vulnerable to my attacks because during the delay (up to a few minutes), i=
t
continued spawning threads, resulting in a denial of service=2E  eServ 3=2E=
0
uses a new acTCP kernel to improve service=2E  Specifically, it does not
create new threads beyond its maximum connection queue=2E  The delay
condition still exists, but cannot be exploited to cause major memory loss=
=2E
I recommend that eServ 2=2E9x users contact the vendor about upgrading as
appropriate=2E =20

eServ has had one other vulnerability, a buffer overrun in its virtual hos=
t
support=2E  Stating that eServ has a "horrible security record" was perhap=
s a
horrible overstatement on my part=2E :-)

There have been other vulnerabilities in products un-related to eServ,
which were developed on the same kernel=2E  Specifically, acFTP's
authentication logging bug, and the acFreeProxy XSS, which I have been
informed was the result of a configuration error=2E

I was also informed during discussions with the developer that the reason
my e-mail was not replied to immediately was because of Russia's day of
victory celebrations, and not due to negligence=2E

--------------------------------------------------------------------
mail2web - Check your email from the web at
http://mail2web=2Ecom/ =2E


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH