Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 19 Jun 2012 00:16:14 +0200
From:      Oliver Pinter <oliver.pntr@gmail.com>
To:        freebsd-security@freebsd.org
Subject:   FYI: Fwd: [Dailydave] CANVAS SYSRET Module
Message-ID:  <CAPjTQNGJBwwMZUNuannVe-pyyfVQpqfOyZUQwzUm66C6o-Y0Fg@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
---------- Forwarded message ----------
From: Alex McGeorge <alexm@immunityinc.com>
Date: Mon, 18 Jun 2012 10:10:09 -0400
Subject: [Dailydave] CANVAS SYSRET Module
To: dailydave@lists.immunityinc.com, canvas@lists.immunityinc.com

Aloha lists,

There has been a lot of talk about the SYSRET vulnerability [1] recently
and even some pretty good write ups [2]. Of course the best discussion
of this bug will undoubtedly come from Rafal at his BlackHat talk in
Vegas [3].

For those of you who are eager to see an exploit for this vulnerability
in action we've got you covered:
http://partners.immunityinc.com/movies/SYSRET-v2.mov . The exploit has
been available since Friday to CANVAS Early Updates (CEU) customers for
their FreeBSD privilege escalation pleasure, courtesy of our Unix
exploit development team. For CEU inquiries please email
admin@immunityinc.com .

We were chatting about this on Friday, do other people see FreeBSD in
the enterprise on pen-tests? Outside of a few NAS solutions I've seen it
employed in source control and for other important tasks (DNS, FTP). Now
that Linux is so common place is FreeBSD considered exotic?

Cheers,
-AlexM

[1] http://www.kb.cert.org/vuls/id/649219
[2]
http://blog.xen.org/index.php/2012/06/13/the-intel-sysret-privilege-escalation/
[3] https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Wojtczuk

-- 
Alex McGeorge
Immunity Inc.
1130 Washington Avenue 8th Floor
Miami Beach, Florida 33139
P: 786.220.0600



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPjTQNGJBwwMZUNuannVe-pyyfVQpqfOyZUQwzUm66C6o-Y0Fg>