Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Bush2000
The vulnerability could allow attackers to take administrative control of compromised systems and run attack code of their choice, an iSec advisory stated. ISec claimed that it had developed and successfully tested code that was capable of exploiting the flaw, although it added that actually launching such an attack wouldn't be easy.

Do you know of an article that actually details the flaw and how it can be exploited?

6 posted on 01/10/2004 12:34:49 PM PST by Gunslingr3
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Gunslingr3
Do you know of an article that actually details the flaw and how it can be exploited?

http://isec.pl/vulnerabilities03.html
9 posted on 01/10/2004 12:42:50 PM PST by Bush2000
[ Post Reply | Private Reply | To 6 | View Replies ]

To: Gunslingr3
Gunslingr3 wrote:
Do you know of an article that actually details the flaw and how it can be exploited?
This particular flaw in the VM system is described at http://isec.pl/vulnerabilities/isec-0013-mremap.txt.

That doesn't really detail the vulnerability or the exploit, only the underlying flaw in the virtual memory remap routine tha allows an exploit.

To exploit this flaw, you need to have access to a user account on the target machine, and a way to compile programs for execution on the target machine (you could compile them elsewhere and transfer them to the target machine, though). If you have that, and you sucessfully exploit the somewhat unpredictable behavior of the VM system, you can under some circumstances execute code of your own choosing at the kernel level, possibly granting yourself root access or doing other things that are beyond what is allowed your acccount's access privileges.

By itself, this is a pretty limited vulnerability. To exploit this vulnerability, an attacker would have to use other means to gain access to a user account on the target machine before the attacker could launch an attack.

57 posted on 01/11/2004 2:22:49 PM PST by cc2k
[ Post Reply | Private Reply | To 6 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson