Authored by Don A. Bailey
Founder / CEO
Lab Mouse Security
@InfoSecMouse
https://www.securitymouse.com/
A simulated 64bit exploit against the Linux kernel LZ4 implementation. The C file in the pastebin is a patched version of the lz4_decompress.c file that allows for standalone execution with an arbitrary payload. As you can see I pass in a payload of my choice with the decompression buffer set to output[32], and a size of 32 bytes. Yet, when the code is executed, the string "donbdonb" resides at output[0]. I will wait to give out the script "mklz4.sh" that generates the malicious payload
pastebin link here which expires in 6 days....http://pastebin.com/kG3AsUKP
Image may be NSFW.Founder / CEO
Lab Mouse Security
@InfoSecMouse
https://www.securitymouse.com/
A simulated 64bit exploit against the Linux kernel LZ4 implementation. The C file in the pastebin is a patched version of the lz4_decompress.c file that allows for standalone execution with an arbitrary payload. As you can see I pass in a payload of my choice with the decompression buffer set to output[32], and a size of 32 bytes. Yet, when the code is executed, the string "donbdonb" resides at output[0]. I will wait to give out the script "mklz4.sh" that generates the malicious payload
pastebin link here which expires in 6 days....http://pastebin.com/kG3AsUKP
Clik here to view.
