From: Michael Richardson Date: Mon, 9 Sep 2019 23:13:23 +0000 (-0400) Subject: added test cases for smb issues X-Git-Tag: tcpdump-4.9.3~43 X-Git-Url: https://git.tcpdump.org/tcpdump/commitdiff_plain/b8f025d17f8d9d32542d21bff6dae25199761a91?hp=745cdfc3cc67a44b428b45b171fd59f64976f92e added test cases for smb issues --- diff --git a/tests/TESTLIST b/tests/TESTLIST index c5d79311..f5f0c81f 100644 --- a/tests/TESTLIST +++ b/tests/TESTLIST @@ -344,9 +344,6 @@ kday8 kday8.pcap kday8.out -v cve2015-0261_01 cve2015-0261-ipv6.pcap cve2015-0261-ipv6.out -v cve2015-0261_02 cve2015-0261-crash.pcap cve2015-0261-crash.out -v -# bad packets from Luis Rocha -cve-2018-10105-segv-sflowprint cve-2018-10105-segv-sflowprint.pcap cve-2018-10105-segv-sflowprint.out -v - # OLSRv1 tests olsrv1_1 OLSRv1_HNA_sgw_1.pcap OLSRv1_HNA_sgw_1.out -v @@ -648,4 +645,9 @@ kh-tcpdump-002 kh-tcpdump-002.pcap kh-tcpdump-002.out kh-tcpdump-003 kh-tcpdump-003.pcap kh-tcpdump-003.out -# CVE-2019-15116 \ No newline at end of file +# CVE-2018-10105 bad packets from Luis Rocha +cve-2018-10105-segv-sflowprint cve-2018-10105-segv-sflowprint.pcap cve-2018-10105-segv-sflowprint.out -v +cve-2018-10105_smbprint-readofsize1 cve-2018-10105_smbprint-readofsize1.pcap cve-2018-10105_smbprint-readofsize1.out +cve-2018-10105_smbutil_withoutasan cve-2018-10105_smbutil_withoutasan.pcap cve-2018-10105_smbutil_withoutasan.out + + diff --git a/tests/cve-2018-10105_smbprint-readofsize1.out b/tests/cve-2018-10105_smbprint-readofsize1.out new file mode 100644 index 00000000..81729eb0 --- /dev/null +++ b/tests/cve-2018-10105_smbprint-readofsize1.out @@ -0,0 +1,8 @@ +IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 4267808374:4267808462, ack 628292694, win 63102, length 88 SMB PACKET: SMBtrans2 (REPLY) + +IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 1:75, ack 88, win 254, length 74 SMB PACKET: SMBtrans2 (REQUEST) + +IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 88:168, ack 75, win 62978, length 80 SMB PACKET: SMBtrans2 (REPLY) + +IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 75:151, ack 168, win 253, length 76 SMB PACKET: SMBtrans2 (REQUEST) + diff --git a/tests/cve-2018-10105_smbprint-readofsize1.pcap b/tests/cve-2018-10105_smbprint-readofsize1.pcap new file mode 100644 index 00000000..984bc3a8 Binary files /dev/null and b/tests/cve-2018-10105_smbprint-readofsize1.pcap differ diff --git a/tests/cve-2018-10105_smbutil_withoutasan.out b/tests/cve-2018-10105_smbutil_withoutasan.out new file mode 100644 index 00000000..6c851342 --- /dev/null +++ b/tests/cve-2018-10105_smbutil_withoutasan.out @@ -0,0 +1,8 @@ +IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 4267808374:4267808462, ack 628292694, win 63102, length 88 SMB PACKET: SMBtrans2 (REPLY) + +IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 1:75, ack 88, win 254, length 74 SMB PACKET: SMBtrans2 (REQUEST) + +IP 192.168.56.55.445 > 192.168.56.119.49199: Flags [P.], seq 88:168, ack 75, win 63028, length 80 SMB PACKET: SMBtrans2 (REPLY) + +IP 192.168.56.119.49199 > 192.168.56.55.445: Flags [P.], seq 75:151, ack 168, win 253, length 76 SMB-over-TCP packet:(raw data or continuation?) + diff --git a/tests/cve-2018-10105_smbutil_withoutasan.pcap b/tests/cve-2018-10105_smbutil_withoutasan.pcap new file mode 100644 index 00000000..3b29577e Binary files /dev/null and b/tests/cve-2018-10105_smbutil_withoutasan.pcap differ