Articles with tag: Research
POSTED BY: Patroklos Argyroudis / 23.05.2010

FreeBSD kernel NFS client local vulnerabilities

CENSUS ID:CENSUS-2010-0001
CVE ID:CVE-2010-2020
Affected Products:FreeBSD 8.0-RELEASE, 7.3-RELEASE, 7.2-RELEASE
Class:Improper Input Validation (CWE-20)
Remote:No
Discovered by:Patroklos Argyroudis

We have discovered two improper input validation vulnerabilities in the FreeBSD kernel’s NFS client-side implementation (FreeBSD 8.0-RELEASE, 7.3-RELEASE and 7.2-RELEASE) that allow local unprivileged users to escalate their privileges, or to crash the system by performing a denial of service attack.


POSTED BY: Patroklos Argyroudis / 26.04.2010

FreeBSD kernel exploitation mitigations

In my recent Black Hat Europe 2010 talk I gave an overview of the kernel exploitation prevention mechanisms that exist on FreeBSD. A few people at the conference have subsequently asked me to elaborate on the subject. In this post I will collect all the information from my talk and the various discussions I had in the Black Hat conference hallways.


POSTED BY: Dimitrios Glynos / 03.04.2010

Update on canary randomisation for hardened Linux applications

This article is a followup to our last year’s advisory on canary randomisation for applications of the Debian distribution.


POSTED BY: Patroklos Argyroudis / 14.12.2009

Monkey HTTPd improper input validation vulnerability

CENSUS ID:CENSUS-2009-0004
Affected Products:Monkey web server versions ≤ 0.9.2.
Class:Improper Input Validation (CWE-20), Incorrect Calculation (CWE-682)
Remote:Yes
Discovered by:Patroklos Argyroudis

We have discovered a remotely exploitable “improper input validation” vulnerability in the Monkey web server that allows an attacker to perform denial of service attacks by repeatedly crashing worker threads that process HTTP requests.