|
Saul Procterm
@
pozdnychev
Combray, France
|
|
Stuff and whatnot.
|
|
|
38
Tweetovi
|
12
Pratim
|
137
Osobe koje vas prate
|
| Tweetovi |
|
Saul Procterm
@pozdnychev
|
28. sij |
|
Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: openwall.com/lists/oss-secu…
PS: "Did you ever play tic-tac-toe?"
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
11. pro |
|
Qualys Security Advisory Team: Local Privilege Escalation in OpenBSD's loader (ld.so, CVE-2019-19726). Getting root on default install (i386/amd64), by tweaking the environment variables. Exploit and more details at: openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
8. pro |
|
|
||
|
Saul Procterm
@pozdnychev
|
4. pro |
|
Qualys Security Advisory: Authentication vulnerabilities in OpenBSD's auth system (CVE-2019-19521). LPE on default install via xlock (CVE-2019-19520) and su (CVE-2019-19519). Local root if S/Key or yubikey is enabled (CVE-2019-19522). More details at openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
6. ruj |
|
|
||
|
Saul Procterm
@pozdnychev
|
6. lip |
|
Qualys Security Advisory Team: "The return of the WIZard", now the full advisory (CVE-2019-10149) is available at openwall.com/lists/oss-secu… …
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
6. lip |
|
You're absolutely right, it's on another level. I was more concerned by the 280 char limit than the tweet content.
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
5. lip |
|
Qualys Security Advisory Team: "The return of the WIZard" (CVE-2019-10149). Instant LPE in Exim (4.87 to 4.91). Seven days to trigger a RCE. No memory corruption or ROP involved. Bypass NX/ASLR/SSP/PIE/full RELRO/etc. Architecture independent. More at openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
10. svi |
|
More details given here: openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
9. svi |
|
If your distribution is pretty close to the ones mentioned above, you might want to edit target.c and change the md5sum to give a shot. It should take, as the advisories says, about 10min on i386 and 70+min on amd64, with a quite big variance.
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
9. svi |
|
Qualys Security Advisory Team: "System Down" (systemd-journald) exploit
for CVE-2018-16865 and CVE-2018-16866 is released. It should work at least on Debian Stretch (i386/amd64), Ubuntu 18.04.1 (amd64) and CentOS 7.5 (amd64). More at qualys.com/2019/05/09/sys…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
9. sij 2019. |
|
s/memory leak/information leak/.
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
9. sij 2019. |
|
Qualys Security Advisory team: "System Down: a systemd-journald exploit". Memory corruptions (CVE-2018-1686{4,5}) and one memory leak (CVE-2018-16866) in systemd. LPE on most Linux distros (except those compiled with -fstack-clash-protection). Details at openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
25. ruj 2018. |
|
Qualys Security Advisory Team - Mutagen Astronomy: Integer overflow in Linux's create_elf_tables(), CVE-2018-14634. LPE (full root) from a suid-root binary. RHEL, CentOS and Debian 8 are vulnerable. Advisory, PoC and exploit at: openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
27. kol 2018. |
|
Qualys Security Advisory Team: another OpenSSH "user enumeration". From OpenSSH 5.9 to 7.8 (august 24th, 2018). "PoC" (well, a 2-liners) provided. More details on openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
23. kol 2018. |
|
Just read the e-mail sent to oss-sec: openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
15. kol 2018. |
|
Qualys Security Advisory Team: OpenSSH Username Enumeration, in all versions (Linux, *BSD, ...) since november 2000. Fixed in 7.8p1 but not tagged as a security issue. More details in openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
3. lip 2018. |
|
pwndbg... when the installation is not f*cked up.
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
17. svi 2018. |
|
Qualys Security Advisory team: Procps-ng audit; 127 proposed patches, from minor bugs to security ones; 7 CVEs; 2 Denials of service; One process-hiding method; 2 LPEs; Userland vulnerability leading to escape from a container. openwall.com/lists/oss-secu…
|
||
|
|
||
|
Saul Procterm
@pozdnychev
|
13. pro 2017. |
|
Qualys Security Advisory Team: various bugs in iscsiuio, openwall.com/lists/oss-secu…
|
||
|
|
||