Lucene search

K
zdtMarcel BΓΆhme1337DAY-ID-28204
HistoryJul 28, 2017 - 12:00 a.m.

GNU libiberty - Buffer Overflow Exploit

2017-07-2800:00:00
Marcel BΓΆhme
0day.today
28

0.027 Low

EPSS

Percentile

89.5%

Exploit for linux platform in category dos / poc

Source: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
 
 
The attached program binary causes a buffer overflow in cplus-dem.c when it tries to demangle specially crafted function arguments in the binary. Both the buffer size as well as the buffer content are controlled from the binary.
 
objdump -x -C <file>
nm -C <file>
 
Tested on the following configurations
* 2.6.32-573.7.1.el6.x86_64 #1 SMP Tue Sep 22 22:00:00 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
* 4.1.12-boot2docker #1 SMP Tue Nov 3 06:03:36 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
* Binutils versions: 2.20 and 2.26
 
 
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/42386.zip

#  0day.today [2018-01-03]  #