Do you know of an article that actually details the flaw and how it can be exploited?
Gunslingr3 wrote:This particular flaw in the VM system is described at http://isec.pl/vulnerabilities/isec-0013-mremap.txt.
Do you know of an article that actually details the flaw and how it can be exploited?
That doesn't really detail the vulnerability or the exploit, only the underlying flaw in the virtual memory remap routine tha allows an exploit.
To exploit this flaw, you need to have access to a user account on the target machine, and a way to compile programs for execution on the target machine (you could compile them elsewhere and transfer them to the target machine, though). If you have that, and you sucessfully exploit the somewhat unpredictable behavior of the VM system, you can under some circumstances execute code of your own choosing at the kernel level, possibly granting yourself root access or doing other things that are beyond what is allowed your acccount's access privileges.
By itself, this is a pretty limited vulnerability. To exploit this vulnerability, an attacker would have to use other means to gain access to a user account on the target machine before the attacker could launch an attack.