Quantcast
Viewing all articles
Browse latest Browse all 8064

LZ4 memory corruption PoC (Expires on Pastebin in 6 Days)

Authored by Don A. Bailey
Founder / CEO
Lab Mouse Security
@InfoSecMouse
https://www.securitymouse.com/

A simulated 64bit exploit against the Linux kernel LZ4 implementation. The C file in the pastebin is a patched version of the lz4_decompress.c file that allows for standalone execution with an arbitrary payload. As you can see I pass in a payload of my choice with the decompression buffer set to output[32], and a size of 32 bytes. Yet, when the code is executed, the string "donbdonb" resides at output[0]. I will wait to give out the script "mklz4.sh" that generates the malicious payload

pastebin link here which expires in 6 days....http://pastebin.com/kG3AsUKP

Image may be NSFW.
Clik here to view.

Viewing all articles
Browse latest Browse all 8064

Trending Articles