Posts
2579
Following
628
Followers
1403
"I'm interested in all kinds of astronomy."
repeated
repeated
Has anyone checked if macOS is vulnerable to regreSSHion (Qualys's OpenSSH SIGALRM vulnerability, CVE-2024-6387)?

Qualys's writeup notes that glibc is vulnerable because its malloc skips locking on single threaded programs
(https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt),

macOS doesn't have this optimization: malloc always seems to take locks, and will crash in `os_unfair_lock_recursive_abort` if you try to call it during an interrupted call.

So Qualys's initial exploit strategy probably won't work.

macOS's syslog is complex, however; it has several files (https://github.com/apple-oss-distributions/syslog/tree/main/libsystem_asl.tproj/src) that uses malloc, Mach messaging, libdispatch, XPC, ObjC... would there be something non-re-entrant-safe there? If so, would the lock aborts prevent you from exploiting them?
0
4
0
repeated
repeated
repeated
Edited 9 months ago

== Let's make a magnetophone / tape player / magnetic tape head at home! ==

Many people started following me after my DIY magnetic tape and DIY floppy disk experiments. A common request ever since was to make a DIY magnetic head, and, truth to be told, I was curious to experiment with it, too.

The task was daunting, and many people were convinced that it could not be done at all. In fact, I could not find a single mention of a successful experiment in the West, and scarce mentions of it in vintage Russian radio hobbyist magazines. But I know that it could be done; my father says he made some magnetic heads over 40 years ago.

Just two weeks ago Hackaday.com made a post claiming that a (really cool btw) hobbyist made a tape player with a DIY tape head. I was excited at first, and then outraged - it was fake news! The DIY tape head was not (and could not be) used in the tape player on the video, and in fact could only erase tape.

Now, I present you The Real DIY Magnetic/Tape Head (and a DIY microphone)

🧵~

2
8
1
I was doing a training for sysadmins, and this guy cleared MotW from one of the SmartScreen demo samples in ~3secs from muscle memory.

I was kinda impressed!
0
0
2
[RSS] STRIDE: Simple Type Recognition In Decompiled Executables

https://github.com/hgarrereyn/STRIDE
0
0
2
[RSS] SSD Advisory – Foscam R4M UDTMediaServer Buffer Overflow

https://ssd-disclosure.com/ssd-advisory-foscam-r4m-udtmediaserver-buffer-overflow/
0
0
0
[RSS] Getting Unauthenticated Remote Code Execution on the Logsign Unified SecOps Platform

https://www.thezdi.com/blog/2024/7/1/getting-unauthenticated-remote-code-execution-on-the-logsign-unified-secops-platform
0
0
0
Ring Around The Regex: Lessons learned from fuzzing regex libraries (Part 1)

https://secret.club/2024/06/30/ring-around-the-regex-1.html
0
1
3
Jack Ren - Exploiting a SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE

https://github.com/bjrjk/CVE-2024-29943/blob/main/Slides.pdf
0
0
1
repeated
repeated

did you know that intel shipped a userspace driver that does kernel physical memory grooming (like heap grooming, but for physmem allocations) to get a contiguous memory block https://git.dpdk.org/dpdk/tree/lib/eal/linux/eal_memory.c

like... allocates a bunch of pages, checks if they're physically contiguous, frees the ones that are not, and retries it has enough that are, more or less

2
4
0
repeated
Ok, finally! Here wo go: on via .

Here, we have a basic image running which will be soon shared as a raw image (including instructions how to run it w/o patched and also trying to provide a image.


4
3
0
repeated

🦀 The slides for my workshop at @recon in Montreal this year, "Reversing Rust Binaries: One Step Beyond Strings", are now online!

https://github.com/cxiao/rust-reversing-workshop-recon-2024/tree/main/slides

You can find both the slides and the diagrams I used for the workshop linked there. The slides are meant to be a resource for you to use while reversing, so they have lots of clickable links in them (:

In case you lose the link, you can also find the slides linked from my page on the REcon 2024 schedule: https://cfp.recon.cx/recon2024/talk/QCA37X/

Really great to meet so many cool people, and lots of work to do for Rust RE going forward! I left the conference with a lot of great ideas and directions for new research.

0
7
0
repeated

use-after-free vulnerability due to the interaction between Unix garbage collection (GC) and the io_uring Linux kernel component

https://blogs.oracle.com/linux/post/unix-garbage-collection-and-iouring

Credits Shoily Rahman

0
4
0
Show older