Exploit ReiserFS 3.5.28 (Linux Kernel) - Code Execution / Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20535
Проверка EDB
  1. Пройдено
Автор
MARC LEHMANN
Тип уязвимости
DOS
Платформа
LINUX
CVE
cve-2001-0172
Дата публикации
2001-01-09
Код:
source: https://www.securityfocus.com/bid/2180/info

ReiserFS is a file system alternative to the Linux ext2 file system. It was originally written by Hans Reiser, and is freely available and publicly maintained.

A problem has been reported in the handling of long file names with ReiserFS version 3.5.28 on SuSE Linux distribution 7.0. It is possible to create a directory with a long file name (the initial example displayed a directory with 768 characters), then attempt to list the file system using system binary ls or with built in shell function echo and create a Denial of Service. Upon attempting to list or echo the contents of the filesystem, a kernel buffer overflow occurs, overwriting variables on the stack including possibly the return address, as well as crashing the system. It may be possible for a malicious user to execute arbitrary code, deny service to legitimate users, and potentially break out of a chroot environment. This vulnerability is yet unverified. 

mkdir "$(perl -e 'print "x" x 768')"
 
Источник
www.exploit-db.com

Похожие темы