tl;dr
- Leak with Format String bug.
- Use the arbitrary heap pointer write to overwrite
__GI__IO_file_jumps
. - Inject shellode in heap and get code execution in
dfprintf
.
tl;dr
__GI__IO_file_jumps
.dfprintf
.tl;dr
tl;dr
Writeup from InCTFi 2019 bartender
tl;dr Windows 32-bit SEH exploitation
tl;dr 2 element overflow in Array when jit compiled
tl;dr
Array.pop
. Uint32Array
and a Uint8Array
to get a overflow in an ArrayBuffer
and proceed to convert this to arbitrary read-write and execute shellcode.tl;dr
This post will describe how I exploited CVE-2019-14378, which is a pointer miscalculation in network backend of QEMU. The bug is triggered when large IPv4 fragmented packets are reassembled for processing. It was found by code auditing.
2 / 2