12.07.2015 Views

Bug Hunter Diary

Bug Hunter Diary

Bug Hunter Diary

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3: Escape from the WWW Zone 253.1 Vulnerability Discovery .......................................... 25Step 1: List the IOCTLs of the Kernel .............................. 26Step 2: Identify the Input Data. .................................. 27Step 3: Trace the Input Data .................................... 283.2 Exploitation. ................................................. 35Step 1: Trigger the NULL Pointer Dereference for a Denial of Service. ....... 35Step 2: Use the Zero Page to Get Control over EIP/RIP ................. 393.3 Vulnerability Remediation ........................................ 483.4 Lessons Learned. .............................................. 493.5 Addendum .................................................. 49Chapter 4: NULL Pointer FTW 514.1 Vulnerability Discovery .......................................... 52Step 1: List the Demuxers of FFmpeg .............................. 52Step 2: Identify the Input Data. .................................. 52Step 3: Trace the Input Data .................................... 534.2 Exploitation. ................................................. 56Step 1: Find a Sample 4X Movie File with a Valid strk Chunk ............. 57Step 2: Learn About the Layout of the strk Chunk. ..................... 57Step 3: Manipulate the strk Chunk to Crash FFmpeg ................... 58Step 4: Manipulate the strk Chunk to Gain Control over EIP .............. 614.3 Vulnerability Remediation ........................................ 664.4 Lessons Learned. .............................................. 694.5 Addendum .................................................. 69Chapter 5: Browse and You’re Owned 715.1 Vulnerability Discovery .......................................... 71Step 1: List the Registered WebEx Objects and Exported Methods ......... 72Step 2: Test the Exported Methods in the Browser ..................... 74Step 3: Find the Object Methods in the Binary ....................... 76Step 4: Find the User-Controlled Input Values ........................ 78Step 5: Reverse Engineer the Object Methods. ....................... 795.2 Exploitation. ................................................. 825.3 Vulnerability Remediation ........................................ 845.4 Lessons Learned. .............................................. 845.5 Addendum .................................................. 84Chapter 6: One Kernel to Rule Them All 876.1 Vulnerability Discovery .......................................... 88Step 1: Prepare a VMware Guest for Kernel Debugging ................ 88Step 2: Generate a List of the Drivers and Device Objects Createdby avast! .............................................. 88Step 3: Check the Device Security Settings .......................... 90Step 4: List the IOCTLs ........................................ 90Step 5: Find the User-Controlled Input Values ........................ 97Step 6: Reverse Engineer the IOCTL Handler ........................ 99viiiContents in Detail

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!