what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

windows-FAT-recursion.txt

windows-FAT-recursion.txt
Posted Aug 17, 1999
Authored by xm

Windows FAT Filesystem Advisory: Recursive directory creation can be used as a Denial of Service attack against Windows* servers that allow anonymous FTP upload, and any that allow users to create directories and execute files.

tags | exploit, denial of service
systems | windows
SHA-256 | bab71ed1bea79436a1c61aa4bc40f4b35f976ddc2c6b334802cf7cc588f083dc

windows-FAT-recursion.txt

Change Mirror Download
Windows FAT Filesystem Advisory


It appears that Windows' FAT file system can be messed up by creating a long enough series of recursive
directories. After a certain point is reached, directories cannot be deleted. Because each directory added to the file
allocation takes up a certain amount of space, this can be considered a denial of service attack against the Windows
filesystem, allowing a user able to create directories to consume disk space. Microsoft's scandisk does not correct
this problem (do any commercial products?). Windows cannot delete the directory, claiming it is in use. And running
deltree against it seems to hang the system. So better lock down that anonymous ftp upload directory!

I fired this off in 20 minutes after discovering a clever script I made messed up my filesystem. I'm sure I have
made a few technical errors and would love corrections. I would appreciate any specific observations about behavior
of this on various filesystems and platforms, and any workarounds or fixes found. If you find anything or just want
to comment email xm <xm@geekmafia.dynip.com>. And be sure to check out our main site <http://GeekMafia.dynip.com/>!

Sample Code (pissy.bat)

mkdir y
cd y
C:\pathto\pissy.bat



fatalert.shtml modified Friday, 05-Feb-1999 22:39:02 EST xm@geekmafia.dynip.com Copyright 1998, 1999 Geek
Mafia and xm. They may be redistributed freely at no cost in its original form.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close