vendor:
N/A
by:
Ramon de C Valle
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: CVE-2011-3192
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0542/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/cisco-nx-os-cisco-sa-20110830-apache/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1369/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1294/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-7f6108d2-cea8-11e0-9d58-0800279895ea/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/ibm-http_server-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1245/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1329/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apache-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/cisco-san-os-cisco-sa-20110830-apache/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2011-3192/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2011-01/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2011
Reverse Engineered Exploit for CVE-2011-3192
This is a reverse engineered version of the exploit for CVE-2011-3192 made by ev1lut10n. It is a denial of service exploit which uses the ptrace() system call to detect if the process is being traced. If it is, it will exit with a segmentation fault. The exploit also uses the getaddrinfo() function to connect to the target host and send a GET request to the server. This will cause the server to crash.
Mitigation:
Disable ptrace() system call and use a web application firewall to filter out malicious requests.