Udisks2 2.8.0 denial of service (poc) Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2018-09-24 |
Type : dos |
Platform : linux
This exploit / vulnerability Udisks2 2.8.0 denial of service (poc) is for educational purposes only and if it is used you will do on your own risk!
# =================Short Whitepaper=================
# The vulnerability can be triggered by using one computer to create a filesystem on a USB key
# (or other removable media), then editing it's filesystem label to include a bunch of %n's, removing and
# inserting the media into another computer running udisks2 <=2.8.0. This binary runs as root, and if
# exploited in that capacity could potentially allow full compromise. This will cause a denial of service,
# crashing udisks2 and not letting it restart (or until /var/lib/udisks2/mounted-fs is
# removed and the system is restarted). This keeps the system from automounting things like USB drives and CDs.
# The vulnerability -may- be exploitable beyond a DoS by crafting a format string exploit and putting it
# in the label of the drive. I tried to exploit it for a couple days, but cannot find a filesystem with a
# lengthy enough label to be able to fit the exploit and spawn a root shell, as the smallest shellcode I
# could make was around 50 characters, and the longest filesystem labels I could find are limited to 32 characters.
# =============Proof of Concept Code================
# This code will destroy any information on /dev/sdb1!!!! Change that to where you have your USB media.
# PoC source code: