lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1a9f19350612211417v28322f5j965d36befef3f366@mail.gmail.com>
Date: Thu, 21 Dec 2006 15:17:14 -0700
From: "Pukhraj Singh" <pukhraj.singh@...il.com>
To: "Alexander Sotirov" <asotirov@...ermina.com>
Cc: 3APA3A <3APA3A@...urity.nnov.ru>,
	full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: [Full-disclosure] Microsoft Windows XP/2003/Vista memory corruption 0day

Holy mackerel! Instances of this bug date back to 1999!

http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff

--Pukhraj

On 12/21/06, Alexander Sotirov <asotirov@...ermina.com> wrote:
> 3APA3A wrote:
> > Killer{R}  assumes  the problem is in strcpy(), because it should not be
> > used for overlapping buffers, but at least ANSI implementation of strcpy
> > from  Visual  C  should be safe in this very situation (copying to lower
> > addresses).  May be code is different for Windows XP or vulnerability is
> > later in code.
>
> We discovered this bug some time ago and were preparing an advisory when it was
> publicly disclosed. Since the exploit is already public, here's my analysis of
> the vulnerability:
>
> http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html
>
> It's a double free bug that leads to arbitrary code execution in the CSRSS process.
>
> Alex
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ