[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

GNU libiberty - Buffer Overflow Exploit

Author
Marcel Böhme
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-28204
Category
dos / poc
Date add
28-07-2017
CVE
CVE-2016-2226
Platform
linux
Source: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
 
 
The attached program binary causes a buffer overflow in cplus-dem.c when it tries to demangle specially crafted function arguments in the binary. Both the buffer size as well as the buffer content are controlled from the binary.
 
objdump -x -C <file>
nm -C <file>
 
Tested on the following configurations
* 2.6.32-573.7.1.el6.x86_64 #1 SMP Tue Sep 22 22:00:00 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
* 4.1.12-boot2docker #1 SMP Tue Nov 3 06:03:36 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
* Binutils versions: 2.20 and 2.26
 
 
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/42386.zip

#  0day.today [2024-07-05]  #