Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5467B4A5.3080403@gmail.com>
Date: Sat, 15 Nov 2014 21:16:37 +0100
From: Sven Kieske <svenkieske@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: Linux kernel: SCTP issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 13.11.2014 17:40, Petr Matousek wrote:
> Hi,
> 
> CVE-2014-3673 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de7922bc709eee2f609cd01d98aaedc4cf5ea74
>
>  CVE-2014-3687 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b69040d8e39f20d5215a03502a8e8b4c6ab78395
>
>  CVE-2014-3688 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=26b87c7881006311828bb0ab271a551a62dcceb4
>
>  References: https://bugzilla.redhat.com/show_bug.cgi?id=<CVE>
> 
> Thanks,
> 


I already banged my head at this, but didn't come very far:

Did somebody got a working exploit (one commit mentions
this should be easily exploitable via nmap) yet?

I admit I'm not very good at creating RAW
IP-Packets, I tried to start with these
example wireshark captures:
http://wiki.wireshark.org/SampleCaptures#Stream_Control_Transmission_Protocol_.28SCTP.29

I would also be interested in tutorials
or other literature (links) which
provide information how to create
raw IP-Packets in general and how to
manipulate their content.

My goals are to better understand these
issues and to do some pentesting on
my own infrastructure, plus maybe
test for some other possible protocol
implementation weaknesses in the linux kernel.

I know this is a little of topic, so
you can also reply off list, if you wish.

kind regards and thanks in advance.

Sven
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=xzcB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.