Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 14 Nov 2013 12:20:23 +0000
From: Tim Brown <>
Subject: "I miss LSD", slides, paper and tools relating to finding UNIX system level vulnerabilities (as given at 44CON)


Some of you may already have spotted this, but last night we published our 
slides, paper and some tools from my talk at 44CON earlier in the year.  The 
content can be found at:


The take home points around the System V shared memory issues (detailed in 
more detail in the linked to paper) are:

* System V shared memory is often created with weak permissions.
* Usage of System V shared memory by X11 applications is particularly 
* Qt Project patched Qt APIs (CVE-2013-0254), Oracle patched Java JRE
(CVE-2013-1500), Google patched Chrome independently.
* No progress has been made on the problem more generally by either Red Hat or
* Coccinelle is an effective tool for performing static analysis on large 
corpuses of C.
* Memory corruption attacks against System V shared memory are unlikely.

I've also released a tool called smaSHeM (again linked to) for dumping System 
V shared memory and for manipulating it.

Tim Brown

Download attachment "signature.asc " of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.