|
Message-ID: <52859C01.5060203@redhat.com> Date: Thu, 14 Nov 2013 20:58:57 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: "I miss LSD", slides, paper and tools relating to finding UNIX system level vulnerabilities (as given at 44CON) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 11/14/2013 05:20 AM, Tim Brown wrote: > All, > > Some of you may already have spotted this, but last night we > published our slides, paper and some tools from my talk at 44CON > earlier in the year. The content can be found at: > > * http://labs.portcullis.co.uk/presentations/i-miss-lsd/ > > The take home points around the System V shared memory issues > (detailed in more detail in the linked to paper) are: > > * System V shared memory is often created with weak permissions. * > Usage of System V shared memory by X11 applications is particularly > problematic. * Qt Project patched Qt APIs (CVE-2013-0254), Oracle > patched Java JRE (CVE-2013-1500), Google patched Chrome > independently. * No progress has been made on the problem more > generally by either Red Hat or Debian. * Coccinelle is an effective > tool for performing static analysis on large corpuses of C. * > Memory corruption attacks against System V shared memory are > unlikely. > > I've also released a tool called smaSHeM (again linked to) for > dumping System V shared memory and for manipulating it. > > Tim > One consistent issue I've noticed is any file/object/pipe/whatever gets created is that 99% use the default umask and don't set any explicitly safe permissions. And in most of these cases that leads to problems. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJShZwBAAoJEBYNRVNeJnmTRV4QAIDndwUHA0KkRR77X0BAfHL5 carpp+BHqagcj66kCfov5Dlb0v+yqs1J99FhJQXcASyjUlA7v1iKizOdHdRLmrtU dQKm7eUX2W0OLVX0g+scv41Lkd/A+J+xGwLnpbktdxxq997R9E7ogLewiTe13x9s TeTf3guAY2JMOY/bonc792FiA/iW6NiUos0UKyluBdkP7t3S+C7yvif2A44UqrqI 1fqZzQBmEywcuX0jtQ899+jVHNw8yAgdI5BfYGoCR7o/DaRZyd/cQzI3Hj3EecG0 wX1yS3ypHauDBFRE/meJ43CfIZi7V3cJbSXarj6NrRygfyFsuvQ6w4pFG4ZEKVNK 54V0bWwbqmML/WGbWxsULzZjfUTpCsw16xLpvUj89c/PQxma+KAYOCI0pEVARbhe YP6eYqBLp4Rx2amLtPTWNljolhF7KOHJNFhEJkJ5uFvRwrN1v+zySPiM/sigrdoq hvbD5yGTDfpEogB47zUW/AdCE4tCZ9mS2MwCJ3xaD4I8jdY2Be75FEsN7f8hHa5v YbgHTAe6DVsKdyGRqdt5qs0+SCYTJ2PMPWLoj/eb25RdZbjB3/Au3eT6dEXGrIm3 OHFwP127dPlFeKWusy00esKlEyq9k+tlYqhi1MOVoGeM/09X1LLiHpdQLU6f4U6n 30QG0ufgRj3sRikY0ySL =oo/U -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.