timb-machine (32)

Last Login: March 05, 2021
Assessments
10
Score
32

timb-machine's Latest (10) Contributions

Sort by:
Filter by:
2
Ratings
Technical Analysis

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0624

This bug is trivial to exploit but time consuming to gain useful advantage. Each execution of rmsock leaks 64 bits of kernel memory. Some work on grooming the kernel address space could make this more effective but I didn’t pursue it.

2
Ratings
  • Attacker Value
    Very Low
  • Exploitability
    Very High
Technical Analysis

Unlikely to be setUID, unlikely that you will have write control over the vulnerable part of the RPATH at the point another user runs it. More theoretical than actual.

3
Ratings
  • Attacker Value
    Very Low
  • Exploitability
    Very High
Technical Analysis

Unlikely to be setUID, unlikely that you will have write control over the vulnerable part of the RPATH at the point another user runs it. More theoretical than actual.

2
Ratings
  • Attacker Value
    Very Low
  • Exploitability
    Very High
Technical Analysis

Unlikely to be setUID, unlikely that you will have write control over the vulnerable part of the RPATH at the point another user runs it. More theoretical than actual.

2
Ratings
  • Attacker Value
    Very Low
  • Exploitability
    Very High
Technical Analysis

Unlikely to be setUID, unlikely that you will have write control over the vulnerable part of the RPATH at the point another user runs it. More theoretical than actual.