[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH8yC8=M_YNWAUMeeCmLrUg5OyC1gbFor0d8aDi5qqWNV3Ow3Q@mail.gmail.com>
Date: Sun, 10 Feb 2013 18:48:05 -0500
From: Jeffrey Walton <noloader@...il.com>
To: Daniel Corbe <corbe@...be.net>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: ifIndex overflow (Linux Kernel -
net/core/dev.c) [maybe offtopic]
> The former requiring too much effort
I'm not sure I agree with this statement. When Sony pissed off folks
over the Playstation, countless hours were spent on the breaks and
breach. Confer:
http://thehackernews.com/2012/10/sony-playstation-3-hacked-with-custom.html
and http://www.nbcnews.com/technology/ingame/hackers-stole-personal-data-playstation-network-123618.
It does not hurt that Sony chronically drives drunk on the information
superhighway. Confer:
http://attrition.org/security/rants/sony_aka_sownage.html.
Don't under estimate an attackers will or resolve.
Jeff
On Fri, Feb 8, 2013 at 6:05 AM, Daniel Corbe <corbe@...be.net> wrote:
>
> That would require that you have sufficient access to create pseudo-eth
> devices in the first place. A vector of attack which requires previous
> privilege escalation or which is carried out by an individual in a
> position of trust is wholly uninteresting. The former requiring too
> much effort and the latter requiring a reexamination of your
> interpersonal relationships.
>
> -Daniel
>
> Daniel Preussker <daniel@...ussker.net> writes:
>
>> Hi,
>>
>> I was looking into the net/core/dev.c from the current Kernel
>> (previous also have this) and found out that ifIndex gets incremented
>> by an endless loop.
>>
>> After creating 4 billion pseudo-eth devices I finally got it to
>> overflow and endless loop, had to kill the kernel - fun right?
>>
>>
>>
>> General question, is this known?
>>
>>
>> Daniel Preussker
>>
>> [ Security Consultant, Network & Protocol Security and Cryptography
>> [ LPI & Novell Certified Linux Engineer and Researcher
>> [ +49 178 600 96 30
>> [ Daniel@...ussker.Net
>> [ http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x87E736968E490AA1
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists