6.1 KiB
CVE-2017-1000112
Description
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
POC
Reference
- https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112
- https://hackerone.com/reports/684573
- https://www.exploit-db.com/exploits/45147/
Github
- https://github.com/0dayhunter/Linux-exploit-suggester
- https://github.com/84KaliPleXon3/linux-exploit-suggester
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/C0dak/linux-kernel-exploits
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/IT19083124/SNP-Assignment
- https://github.com/LucidOfficial/Linux-exploit-suggestor
- https://github.com/Metarget/metarget
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
- https://github.com/R0B1NL1N/Linux-Kernal-Exploits-m-
- https://github.com/R0B1NL1N/Linux-Kernel-Exploites
- https://github.com/R0B1NL1N/linux-kernel-exploitation
- https://github.com/Realradioactive/archive-linux-exploit-suggester-master
- https://github.com/SecWiki/linux-kernel-exploits
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/The-Z-Labs/linux-exploit-suggester
- https://github.com/TheJoyOfHacking/mzet-linux-exploit-suggester
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/amane312/Linux_menthor
- https://github.com/amrelsadane123/Ecploit-kernel-4.10-linux-local
- https://github.com/anoaghost/Localroot_Compile
- https://github.com/bcoles/kernel-exploits
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/bsauce/kernel-security-learning
- https://github.com/christianjohnbt/it-links
- https://github.com/cjongithub/it-links
- https://github.com/coffee727/linux-exp
- https://github.com/copperfieldd/linux-kernel-exploits
- https://github.com/distance-vector/linux-kernel-exploits
- https://github.com/fei9747/linux-exploit-suggester
- https://github.com/ferovap/Tools
- https://github.com/frizb/Linux-Privilege-Escalation
- https://github.com/h4x0r-dz/local-root-exploit-
- https://github.com/hikame/docker_escape_pwn
- https://github.com/hktalent/bug-bounty
- https://github.com/iridium-soda/container-escape-exploits
- https://github.com/ismailvc1111/Linux_Privilege
- https://github.com/jiayy/android_vuln_poc-exp
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/kkamagui/linux-kernel-exploits
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/kyuna312/Linux_menthor
- https://github.com/lnick2023/nicenice
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/maririn312/Linux_menthor
- https://github.com/milabs/kiddy
- https://github.com/milabs/lkrg-bypass
- https://github.com/mzet-/linux-exploit-suggester
- https://github.com/n3t1nv4d3/kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nikaiw/rump
- https://github.com/nmvuonginfosec/linux
- https://github.com/ol0273st-s/CVE-2017-1000112-Adpated
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
- https://github.com/pradeepavula/Linux-Exploits-LES-
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qiantu88/Linux--exp
- https://github.com/rakjong/LinuxElevation
- https://github.com/retr0-13/linux_exploit_suggester
- https://github.com/rodrigosilvaluz/linux-exploit-suggester
- https://github.com/s3mPr1linux/linux-exploit-suggester
- https://github.com/santoshankr/smep_detector
- https://github.com/seclab-ucr/KOOBE
- https://github.com/seeu-inspace/easyg
- https://github.com/spencerdodd/kernelpop
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/stefanocutelle/linux-exploit-suggester
- https://github.com/teamssix/container-escape-check
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/kernel-exploits
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
- https://github.com/yige666/linux-kernel-exploits
- https://github.com/zyjsuper/linux-kernel-exploits