iTerm2 CVE-2019-9535 分析(待续)

最近iterm2被曝了一个CVE-2019-9535,据说可以通过cat xxx达到命令执行的效果。随后我便开始对该漏洞进行分析,走了一趟歪路,不过之后回到正轨,却不知道该漏洞应该如何利用。先把目前分析的结果写一篇文章,如果后续能利用了,再来补充该文章。

Linux内核TCP MSS机制详细分析

前言

上周Linux内核修复了4个CVE漏洞[1],其中的CVE-2019-11477感觉是一个很厉害的Dos漏洞,不过因为有其他事打断,所以进展的速度比较慢,这期间网上已经有相关的分析文章了。[2][3]

而我在尝试复现CVE-2019-11477漏洞的过程中,在第一步设置MSS的问题上就遇到问题了,无法达到预期效果。并且目前公开的分析文章却没对该部分内容进行详细分析,所以本文将通过Linux内核源码对TCP的MSS机制进行详细分析。

Linux Kernel TCP MSS mechanism Analyse

Overview

Last Week, Linux fixes 4 kernel CVE vulnerabilities[1]. Among them, CVE-2019-11477 makes me feel like a very powerful Dos vulnerability. However, because there are other things interrupted, my research progress is slower. For now, there have been some related analysis article in the Internet.[2][3]

In the process of trying to reproduce the CVE-2019-11477 vulnerability. In the first step, I encountered a problem in setting the MSS. I could not achieve the expected results. However, the current published analysis article did not elaborate on this part. So this article will analyze the MSS mechanism of TCP through the Linux kernel source code.