[37713] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Linux kernel IGMP vulnerabilities

daemon@ATHENA.MIT.EDU (Pekka Savola)
Tue Dec 14 16:53:06 2004

Date: Tue, 14 Dec 2004 19:16:39 +0200 (EET)
From: Pekka Savola <pekkas@netcore.fi>
To: security@isec.pl
Cc: bugtraq@securityfocus.com, vulnwatch@vulnwatch.org,
        full-disclosure@lists.netsys.com
In-Reply-To: <Pine.LNX.4.44.0412141125500.1042-100000@isec.pl>
Message-ID: <Pine.LNX.4.61.0412141909120.27442@netcore.fi>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed

Hi,

On Tue, 14 Dec 2004, Paul Starzetz wrote:
>
> Synopsis:  Linux kernel IGMP vulnerabilities
> Product:   Linux kernel
> Version:   2.4 up to and including 2.4.28, 2.6 up to and including 2.6.9
[...]
> Both parts of the IGMP subsystem have exploitable flaws:
>
> (1) the ip_mc_source() function, that can be called through the user API
> (the  IP_(UN)BLOCK_SOURCE,  IP_ADD/DROP_SOURCE_MEMBERSHIP  as  well   as
> MCAST_(UN)BLOCK_SOURCE  and  MCAST_JOIN/LEAVE_SOURCE_GROUP socket SOL_IP
> level options) suffers from a serious  kernel  hang  and  kernel  memory
> overwrite problem.
[...]

Does this also affect earlier 2.4 releases which did not yet 
incorporate IGMPv3?  If so, to which extent?  AFAIR, IGMPv3/MLDv2 was 
added in 2.4.22.

At least the PoC requires *_(UN)BLOCK_SOURCE APIs which were added 
with IGMPv3.

As far as I can see (a very quick look), 2.4 prior to 2.4.22 should 
not be (at least similarly) affected.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

home help back first fref pref prev next nref lref last post