Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 15 Jan 2016 16:58:07 +0100
From: "Jason A. Donenfeld" <Jason@...c4.com>
To: oss-security <oss-security@...ts.openwall.com>, 
	Qualys Security Advisory <qsa@...lys.com>
Subject: Re: Qualys Security Advisory - Roaming through the
 OpenSSH client: CVE-2016-0777 and CVE-2016-0778

On Fri, Jan 15, 2016 at 4:56 PM, Jason A. Donenfeld <Jason@...c4.com> wrote:
> Great work Qualys. One question about the PoC:
>
> On Thu, Jan 14, 2016 at 6:13 PM, Qualys Security Advisory
> <qsa@...lys.com> wrote:
>> # env ROAMING="heap_massaging:linux" "`pwd`"/sshd -o ListenAddress=127.0.0.1:222 -o
>> UsePrivilegeSeparation=no -f /etc/ssh/sshd_config -h /etc/ssh/ssh_host_rsa_key
>
> Does your proof of concept patch actually include support for this
> heap_massaging mode?

Read more carefully, answered my own question:

> - Massage the client's heap before roaming_reply() malloc()ates out_buf,
>   and force malloc() to return a previously free()d but uncleansed chunk
>   of sensitive information. The simple proof-of-concept in this advisory
>   does not implement heap massaging.

That's a shame. Please reconsider.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.