lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 21 Dec 2006 12:11:29 -0800 From: Alexander Sotirov <asotirov@...ermina.com> To: 3APA3A <3APA3A@...URITY.NNOV.RU> Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com Subject: Re: Microsoft Windows XP/2003/Vista memory corruption 0day 3APA3A wrote: > Killer{R} assumes the problem is in strcpy(), because it should not be > used for overlapping buffers, but at least ANSI implementation of strcpy > from Visual C should be safe in this very situation (copying to lower > addresses). May be code is different for Windows XP or vulnerability is > later in code. We discovered this bug some time ago and were preparing an advisory when it was publicly disclosed. Since the exploit is already public, here's my analysis of the vulnerability: http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html It's a double free bug that leads to arbitrary code execution in the CSRSS process. Alex _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists