Pages - Menu

Wednesday, July 1, 2015

Memory Protection Mechanisms

Tuesday, February 3, 2015

Iceweasel 18.0.1 xulrunner-18.0/libxul.so Stack Corruption Vulnerability

Title : Iceweasel 18.0.1 xulrunner-18.0/libxul.so Stack Corruption Vulnerability
Discoverer: Cihat YILDIZ (@cihatix)
Web page : www.binarysniper.net
Test: Debian Linux 3.7 SMP Kali 6
Platform: x64
Status: Not Fixed
Severity: Medium

Discovered : 25 December 2014
Reported :      2 February  2015
Published :     February  2015

Crasher: crasher.pdf
Fuzzing Offset: 280866  (20 30 30 30->FF FF FF FF)

GDB Exploitable Log:


Evince 3.10.3 Crashed with SIGABRT in __kernel_vsyscall()

Title : Evince 3.10.3 Crashed with SIGABRT in __kernel_vsyscall()
Discoverer: Cihat YILDIZ (@cihatix)
Web page : www.binarysniper.net
Test: Ubuntu 14.04.LTS
Status: Fixed in Poppler_0.31
Severity: Medium

Discovered : 25 December 2014
Reported :      2 February  2015
Published :     February  2015

Ubuntu ID: 1417561
FreeDesktop Bugzilla ID: 88990
Crasher: crasher.pdf

GDB Log:

Friday, January 9, 2015

VLC Media Player 2.1.5 Memory Corruption Vulnerabilities

Full Disclosure: seclists.org, packetstormsecurity.com


First Exploitable Bug

Title : VLC Player 2.1.5 DEP Access Violation Vulnerability
Discoverer: Veysel HATAS (@muh4f1z)
Web page : www.binarysniper.net
Vendor :  VideoLAN VLC Project
Test: Windows XP SP3, Windows 7 x64
Status: Fixed on vlc-2.2.0-rc2
Severity : High

CVE ID : CVE-2014-9597
NIST: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9597
OSVDB ID : 116450
VLC Ticket : 13389

windbglog : windbglog.txt

Discovered : 24 November 2014
Reported :   26 December 2014
Published :    9 January 2015

Description : VLC Media Player contains a flaw that is triggered as user-supplied input is not properly sanitized when handling a specially crafted FLV file. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.


Second Exploitable Bug

Title : VLC Player 2.1.5 Write Access Violation Vulnerability
Discoverer: Veysel HATAS (@muh4f1z)
Web page : www.binarysniper.net 
Vendor :  VideoLAN VLC Project
Test: Windows XP SP3, Windows 7 x64
Status: Fixed on vlc-2.2.0-rc2
Severity : High

CVE ID : CVE-2014-9598
NIST: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9598
OSVDB ID : 116451
VLC Ticket : 13390

windbglog : windbglog.txt

Discovered : 24 November 2014
Reported :   26 December 2014
Published :    9 January 2015

Description : VLC Media Player contains a flaw that is triggered as user-supplied input is not properly sanitized when handling a specially crafted M2V file. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.

Technical:
Mcafee : 17666 - VideoLan VLC Media Player libavcodec Two Remote Code Execution Vulnerabilities
SCIP : VideoLAN VLC Media Player 2.1.5 FLV File Handler buffer overflow
Debian : CVE-2014-9597CVE-2014-9598

In the press:


http://channeleye.co.uk/turkish-security-expert-kebabs-vlc/ 
http://www.zdnet.com/article/vlc-vulnerabilities-exposed/ 
http://securityaffairs.co/wordpress/32464/hacking/2-flaws-vlc-media-player.html 
http://threatpost.com/memory-corruption-bugs-found-in-vlc-media-player/110503 
http://www.theregister.co.uk/2015/01/20/vlc_code_exec_flaws/?mt=1421744064349 
http://www.heise.de/security/meldung/Schwachstellen-im-VLC-Player-ermoeglichen-Code-Ausfuehrung-2535794.html