[37738] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Linux kernel IGMP vulnerabilities

daemon@ATHENA.MIT.EDU (Paul Starzetz)
Wed Dec 15 15:57:44 2004

Date: Wed, 15 Dec 2004 13:34:33 +0100 (CET)
From: Paul Starzetz <ihaquer@isec.pl>
To: stephen joseph butler <stephen.butler@gmail.com>
Cc: security@isec.pl, <bugtraq@securityfocus.com>, <vulnwatch@vulnwatch.org>,
        <full-disclosure@lists.netsys.com>
In-Reply-To: <f107df204121421146ed7e337@mail.gmail.com>
Message-ID: <Pine.LNX.4.44.0412151331480.1826-100000@isec.pl>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

On Tue, 14 Dec 2004, stephen joseph butler wrote:

> > /proc/net/igmp
> > /proc/net/mcfilter
> > 
> > if both exist and are non-empty you are vulnerable!
> 
> Just to be clear: if "mcfilter" is empty, then you aren't vulnerable?
> I have both files, and "igmp" contains data, but "mcfilter" is empty.

You are not vulnerable to the remote attack described under (3), however 
your kernel may be still buggy. Note that you need a running process that 
has manipulated its multicast socket filters. If your kernel is buggy and 
you have local users such an application can always appear, at a time you 
don't expect it.

-- 
Paul Starzetz
iSEC Security Research
http://isec.pl/



home help back first fref pref prev next nref lref last post