My 10k-word writeup on exploiting a heap-overflow in Llama.cpp's RPC Server's Tensor-operation to RCE. This by far is one of the most challenging but fun exploitation I've ever researched on.
CVE-2024-43625 - 2024-Nov - Microsoft Windows VMSwitch Elevation of Privilege - Use After Free - CVSS 8.1
#ghidriff vmwsitch diff
https://gist.github.com/clearbluejar/b5c12615270a54d031dc13a7d07988c9
๐๐ฅ
Side-by-side view: https://diffpreview.github.io/?b5c12615270a54d031dc13a7d07988c9 ๐ง
A patch diffing ๐งต...
Have tips? Story ideas? Something you think I should know about?
Reach me on Signal at KimZ.42
I cover cybersecurity and national security, writing about: nation-state hacking, espionage, cyber warfare, cybercrime, and policy. I don't write about companies - unless they've done something wrong.
I keep coming across all these "pseudocode" examples on Wikipedia and in academic papers, and what I don't understand is why the authors can't just learn a real programming language
Project: microsoft/TypeScript https://github.com/microsoft/TypeScript
File: src/services/classifier2020.ts:127 https://github.com/microsoft/TypeScript/blob/cbac1ddfc73ca3b9d8741c1b51b74663a0f24695/src/services/classifier2020.ts#L127
function visit(node: Node)
SVG:
dark https://tmr232.github.io/function-graph-overview/render/?github=https%3A%2F%2Fgithub.com%2Fmicrosoft%2FTypeScript%2Fblob%2Fcbac1ddfc73ca3b9d8741c1b51b74663a0f24695%2Fsrc%2Fservices%2Fclassifier2020.ts%23L127&colors=dark
light https://tmr232.github.io/function-graph-overview/render/?github=https%3A%2F%2Fgithub.com%2Fmicrosoft%2FTypeScript%2Fblob%2Fcbac1ddfc73ca3b9d8741c1b51b74663a0f24695%2Fsrc%2Fservices%2Fclassifier2020.ts%23L127&colors=light
Project: golang/go https://github.com/golang/go
File: src/cmd/internal/obj/ppc64/asm9.go:5134 https://github.com/golang/go/blob/refs/tags/go1.23.4/src/cmd/internal/obj/ppc64/asm9.go#L5134
func (c *ctxt9) oploadx(a obj.As) uint32
SVG:
dark https://tmr232.github.io/function-graph-overview/render/?github=https%3A%2F%2Fgithub.com%2Fgolang%2Fgo%2Fblob%2Frefs%2Ftags%2Fgo1.23.4%2Fsrc%2Fcmd%2Finternal%2Fobj%2Fppc64%2Fasm9.go%23L5134&colors=dark
light https://tmr232.github.io/function-graph-overview/render/?github=https%3A%2F%2Fgithub.com%2Fgolang%2Fgo%2Fblob%2Frefs%2Ftags%2Fgo1.23.4%2Fsrc%2Fcmd%2Finternal%2Fobj%2Fppc64%2Fasm9.go%23L5134&colors=light
A message to my fellow Europeans.
Don't be paralysed by overseas fascism.
It is time for Europe and its citizens to focus less on the USA.
Stop obsessively following the news in a country where you cannot change anything.
Focus your attention on where you can make an impact.
All attention is needed here to fight growing fascism.
Discover the little computer people https://en.wikipedia.org/wiki/Little_Computer_People
We've just released #LibAFL 0.15.0 - A big step toward 1.0 stable!
Featuring
๐ป
We take your vulnerability report very seriously. Internally, we will pass the issue around between developers similar to the childhood game 'hot potato'. After a year of this, we will play a round of musical chairs where the last developer left standing will be assigned the ticket, and then they will also be let go from the company.
We will proceed to a hot potato round when you make your next inquiry. Due to our email retention policy, you will need to re-submit your original report and proof of concept exploit code at that time.
^ honest vulnerability coordination policies