]> The Tcpdump Group git mirrors - tcpdump/commitdiff
added test cases for smb issues
authorMichael Richardson <[email protected]>
Mon, 9 Sep 2019 23:13:23 +0000 (19:13 -0400)
committerFrancois-Xavier Le Bail <[email protected]>
Tue, 24 Sep 2019 12:12:09 +0000 (14:12 +0200)
tests/TESTLIST
tests/cve-2018-10105_smbprint-readofsize1.out [new file with mode: 0644]
tests/cve-2018-10105_smbprint-readofsize1.pcap [new file with mode: 0644]
tests/cve-2018-10105_smbutil_withoutasan.out [new file with mode: 0644]
tests/cve-2018-10105_smbutil_withoutasan.pcap [new file with mode: 0644]

index c5d79311b687487f23b243434be6b5b4301332b8..f5f0c81fc860c14efaba55972edab0dc90c09899 100644 (file)
@@ -344,9 +344,6 @@ kday8           kday8.pcap              kday8.out       -v
 cve2015-0261_01    cve2015-0261-ipv6.pcap       cve2015-0261-ipv6.out -v
 cve2015-0261_02    cve2015-0261-crash.pcap      cve2015-0261-crash.out -v
 
-# bad packets from Luis Rocha
-cve-2018-10105-segv-sflowprint cve-2018-10105-segv-sflowprint.pcap      cve-2018-10105-segv-sflowprint.out -v
-
 # OLSRv1 tests
 olsrv1_1       OLSRv1_HNA_sgw_1.pcap           OLSRv1_HNA_sgw_1.out    -v
 
@@ -648,4 +645,9 @@ kh-tcpdump-002          kh-tcpdump-002.pcap     kh-tcpdump-002.out
 kh-tcpdump-003          kh-tcpdump-003.pcap     kh-tcpdump-003.out
 
 
-# CVE-2019-15116
\ No newline at end of file
+# CVE-2018-10105 bad packets from Luis Rocha
+cve-2018-10105-segv-sflowprint           cve-2018-10105-segv-sflowprint.pcap      cve-2018-10105-segv-sflowprint.out -v
+cve-2018-10105_smbprint-readofsize1      cve-2018-10105_smbprint-readofsize1.pcap cve-2018-10105_smbprint-readofsize1.out
+cve-2018-10105_smbutil_withoutasan       cve-2018-10105_smbutil_withoutasan.pcap  cve-2018-10105_smbutil_withoutasan.out
+
+
diff --git a/tests/cve-2018-10105_smbprint-readofsize1.out b/tests/cve-2018-10105_smbprint-readofsize1.out
new file mode 100644 (file)
index 0000000..81729eb
--- /dev/null
@@ -0,0 +1,8 @@
+IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 4267808374:4267808462, ack 628292694, win 63102, length 88 SMB PACKET: SMBtrans2 (REPLY)
+
+IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 1:75, ack 88, win 254, length 74 SMB PACKET: SMBtrans2 (REQUEST)
+
+IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 88:168, ack 75, win 62978, length 80 SMB PACKET: SMBtrans2 (REPLY)
+
+IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 75:151, ack 168, win 253, length 76 SMB PACKET: SMBtrans2 (REQUEST)
+
diff --git a/tests/cve-2018-10105_smbprint-readofsize1.pcap b/tests/cve-2018-10105_smbprint-readofsize1.pcap
new file mode 100644 (file)
index 0000000..984bc3a
Binary files /dev/null and b/tests/cve-2018-10105_smbprint-readofsize1.pcap differ
diff --git a/tests/cve-2018-10105_smbutil_withoutasan.out b/tests/cve-2018-10105_smbutil_withoutasan.out
new file mode 100644 (file)
index 0000000..6c85134
--- /dev/null
@@ -0,0 +1,8 @@
+IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 4267808374:4267808462, ack 628292694, win 63102, length 88 SMB PACKET: SMBtrans2 (REPLY)
+
+IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 1:75, ack 88, win 254, length 74 SMB PACKET: SMBtrans2 (REQUEST)
+
+IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 88:168, ack 75, win 63028, length 80 SMB PACKET: SMBtrans2 (REPLY)
+
+IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 75:151, ack 168, win 253, length 76 SMB-over-TCP packet:(raw data or continuation?)
+
diff --git a/tests/cve-2018-10105_smbutil_withoutasan.pcap b/tests/cve-2018-10105_smbutil_withoutasan.pcap
new file mode 100644 (file)
index 0000000..3b29577
Binary files /dev/null and b/tests/cve-2018-10105_smbutil_withoutasan.pcap differ