Open tijldeneut opened 2 months ago
hey, thanks for the feedback.
IppSendError
call is still there. To find out whether the system is vulnerable, we would need to determine if an error is thrown out for more than just the initial destination options packet, as this would be in line with the behaviour of IppSendErrorList
. For example, we could send a packet with a malformed destination options header followed by a packet with a properly formed one. Analyzing the number of response packets would then tell us whether the system is vulnerable. The main obstacle though is the fact that we don't know whether the packets were coalesced, so it's possible we'll be receiving only a single error, not due to the system being patched, but due to the fact that packets aren't being coalesced.I want to leave the original poc in this bare bones format to keep it simple, but I wouldn't mind linking to your work in the readme, so that others can make use of them. I won't be doing much more work on this vulnerability as I have to focus on something else, but I can give a quick test to the scripts and link to them if you'd like that. It would also be pretty nice to have a script that tells us whether the system is coalescing packets, but I think a checker script that analyzes the number of responses to a malformed+proper packet duo would also work in that case, as long as we know the system is vulnerable.
Hi, got it to work perfectly, even managed to crash Win Server 2022 with Firewall enabled. Tested on VMware Workstation.
I expanded your work a little bit with some scripts of my own:
Checker: https://github.com/tijldeneut/Security/blob/master/CVE-2024-38063-Checker.py Exploit: https://github.com/tijldeneut/Security/blob/master/CVE-2024-38063-DOS.py
Thanks again, love the work.