lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CACxx4MT1iy996N7_D-qH3iSSUjVkcXyN2aSC22YMDaofBxjRwQ@mail.gmail.com> Date: Thu, 17 Sep 2015 10:29:42 -0700 From: Zach C <uid000@...il.com> To: fulldisclosure@...lists.org Subject: [FD] Broken, Abandoned, and Forgotten Code, Part 12 Part 12 of Broken, Abandoned, and Forgotten Code is up. In this part, we encounter one last implementation bug in the Netgear R6200 UPnP daemon that threatens our hopes of exploitation: an invalid free() just after exploitation but before reboot. I walk you through an investigation of malloc() and free() to understand the crash. I also describe workaround to avoid the crash and reboot into our stage 1 payload. Here's a link to part 12: http://shadow-file.blogspot.com/2015/09/abandoned-part-12.html If you missed my post to Full Disclosure where I introduced the series, here's that: http://seclists.org/fulldisclosure/2015/May/44 As always I welcome feedback via email or Twitter. I'm @zcutlip. I hope you enjoy it! Cheers, Zach -- :wq! _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists