2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of Service Exploit 23 R D Shaun Colley

Bjoern A. Zeeb bzeeb-lists at lists.zabbadoz.net
Wed Nov 11 19:00:12 UTC 2009


On Wed, 11 Nov 2009, Damian Weber wrote:

>
>
> On Wed, 11 Nov 2009, Bjoern A. Zeeb wrote:
>
>> Date: Wed, 11 Nov 2009 17:37:50 +0000 (UTC)
>> From: Bjoern A. Zeeb <bzeeb-lists at lists.zabbadoz.net>
>> To: Oliver Pinter <oliver.pntr at gmail.com>
>> Cc: freebsd-security at freebsd.org, wkoszek at freebsd.org
>> Subject: Re: 2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of
>>     Service  Exploit 23 R D Shaun Colley
>>
>> On Mon, 20 Jul 2009, Oliver Pinter wrote:
>>
>> Hi,
>>
>>> http://milw0rm.com/exploits/9206
>>
>> has anyone actually been able to reproduce a problem scenario with
>> this on any supported releases (7.x or 6.x)?
>>
>> The only thing I gould get from that was:
>> 	execve returned -1, errno=8: Exec format error
>>
>
> FWIW, I got another result on 6.4-STABLE
>
> FreeBSD mymachine.local 6.4-STABLE FreeBSD 6.4-STABLE #6: Sat Oct  3 13:06:12 CEST 2009     root at hypercrypt.local:/usr/obj/usr/src/sys/MYMACHINE  i386
>
> $ ./pecoff
> MZaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaîîîîaaaa
> [I'm truncating here, ~3500 a's follow]aaaaa: File name too long


Not sure if you'd see it with ktrace or not;  I ran into that with my
tests as well and was told that it's a shell problem.

try to run it from this:
------------------------------------------------------------------------
#include <unistd.h>
#include <err.h>

int
main(int argc, char *argv[])
{

 	if (execl("./pecoff", "./pecoff", NULL) == -1)
 		err(1, "execl()");

 	return (0);
}
------------------------------------------------------------------------


/bz

-- 
Bjoern A. Zeeb         It will not break if you know what you are doing.


More information about the freebsd-security mailing list