summaryrefslogtreecommitdiff
path: root/informationals/teso-i0014.txt
diff options
context:
space:
mode:
Diffstat (limited to 'informationals/teso-i0014.txt')
-rw-r--r--informationals/teso-i0014.txt114
1 files changed, 114 insertions, 0 deletions
diff --git a/informationals/teso-i0014.txt b/informationals/teso-i0014.txt
new file mode 100644
index 0000000..aae1243
--- /dev/null
+++ b/informationals/teso-i0014.txt
@@ -0,0 +1,114 @@
10014 2000/02/18 Linux remote DoS overview
2
3==== TESO Informational =======================================================
4This piece of information is to be kept confidential.
5===============================================================================
6
7Description ..........: Linux remote DoS overview
8Date .................: 2000/02/18 21:00
9Author ...............: scut
10Publicity level ......: known
11Affected .............: Linux 1.2.x/2.0.x/2.2.x TCP/IP stack
12Type of entity .......: implementation
13Type of discovery ....: useful information
14Severity/Importance ..: medium
15Found by .............: various people (klepto, humble, horizon)
16
17Information ===================================================================
18
19There are numerous denial of service vulnerabilities in almost every operating
20system in use today. However due to it's broad use Linux has been a focal point
21of interest to search for such vulnerabilities. The results are a number of
22remote denial of service attacks found in the kernel in the past three years.
23While there are a lot of variations to this attacks that work around some
24patches in other operating systems here is a list of all remotely exploitable
25denial of service attacks in the Linux operating systems.
26
27Please feel free to correct me or make additions.
28
29
30<= 2.0.26 Ping of Death
31
32Linux kernels below or equal version 2.0.26 fail to handle oversized IP
33packets, which are send in multiple fragments. This attack has been well known
34and can be exploited as simple as running the "ping" command with certain
35flags. Also several other programs to exploit this vulnerability have been
36written such as ssping.c by vallah. The vulnerability takes place if IP packets
37with a size beyond 2^16 bytes are send to the remote host. The results vary
38from a complete kernel crash to disabled IP functionality.
39
40
41<= 2.0.31 IP fragment overlap bug
42
43This severe bug and first of it's class, followed by many variations was
44discovered by klepto sometime before 1997/11/03 and is based on a bug in the
45Linux kernel IP refragmentation routine. In this routine the kernel reassembles
46all received IP fragments back to one linear data block. While it does some
47basic sanity checks it fails to check for a situation which is unlikely to ever
48happen in normal network conditions. This situation results in way too much
49data (negative integer overflow then casted to unsigned int) copied by the
50kernel, resulting in a system crash or reboot. A public exploit called
51teardrop.c written by route is available.
52
53
54<= 2.0.35 off by one IP header (nestea.c)
55
56While the teardrop vulnerability was unique and quickly being recognized as a
57real threat a fix was developed quickly. There were however a lot of parameters
58to modify in the teardrop sources and people started to play with various
59values resulting in a new teardrop variation called nestea. This exploits a
60similar bug in the IP refragmentation code of the Linux kernel. The public
61exploit is called nestea.c and is written by humble 1998/04/16.
62
63
642.0.36 (possibly others) unknown (?)
65
66There exist a remote denial of service attack which effectively disables any
67IP communication and works with lots of packets send to the victim host. No
68further information is known, but it has been successfully used on the CCCamp
69hacker deathmatch by the ADM team to disable team TESO's network functionality.
70Evidence is pretty strong on this.
71
72
732.1.89 - 2.2.3 zero length fragment bug
74
75This vulnerability within the Linux kernels has been found by horizon on
761999/03/24. The bug allows an attacker to remotely cripple the IP stack of the
77Linux kernel by filling a kernel-internal list of pending IP fragments, which
78wait for reassembly. While filling this list alone doesn't affect the IP stack
79very much there is a implementation bug that allows the attacker to create a
80IP fragment list entry that is "stranded": the Linux kernel will never free it
81anymore. The list is limited to 4096 entries hence creating that many entries
82will result in completely disabled IP functionality for that computer.
83The actual exploitation requires an attacker to send three packets per created
84entry. The first packet is a fragment at offset zero with a defined length (x)
85and the IP More Fragments flag set. The second packet is a zero length fragment
86at offset zero, where the IP header length is equal to the IP total length and
87the IP More Fragments flag is set too. The third packet is a fragment at offset
88x (length of first fragment data) without having IP More Fragments flag set.
89This creates one stranded fragment. A public exploit called sesquipedalian.c is
90available.
91
92
93<= 2.2.9 bogus IP options
94
95All Linux kernels up to and including 2.2.9 have a implementation bug of the IP
96options parsing. When an IP packet with bogus IP options is experienced the
97Linux kernel erroneously releases the allocated memory two times, which causes
98memory corruption and under worst circumstances system crashes (kernel panics).
99There is a public exploit linux-icmp.c, which sends partly random packets
100resulting in a small percentage of invalid packets that will trigger this
101vulnerability. However, a public exploit which exploits the vulnerability in an
102exact way is not available. The vulnerability was made public around 1999/06/01.
103
104
1052.2.x (possibly others) unknown, cause kernel hung (?)
106
107There is a remotely exploitable denial of service vulnerability in the latest
108Linux 2.2.x systems. Evidence is strong that TESO's webserver as well as two
109other TESO related boxes have been taken down with this some month ago.
110However, there are no further informations on this.
111
112
113===============================================================================
114