what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 1,862 RSS Feed

Files from Google Security Research

First Active2000-02-18
Last Active2024-05-13
Shannon Baseband fmtp SDP Attribute Memory Corruption
Posted May 4, 2023
Authored by Google Security Research, natashenka

Shannon Baseband suffers from a memory corruption vulnerability that occurs when the baseband modem processes SDP when setting up a call. When an fmtp attribute is parsed, the integer that represents the payload type is copied into an 8-byte buffer using memcpy with the length of payload type as the length parameter. There are no checks that the payload type is less than 8-bytes long or actually an integer.

tags | exploit
advisories | CVE-2022-26496
SHA-256 | 51aa5a7a2ca1d9308cad99d6da19581180aa08b8653f1c44406c7c5c7dc253b9
Shannon Baseband acfg / pcfg SDP Attribute Memory Corruption
Posted May 4, 2023
Authored by Google Security Research, natashenka

Shannon Baseband suffers from a memory corruption vulnerability that occurs when the baseband modem processes SDP when setting up a call. SDP supports attributes acfg and pcfg that allow configuration information to be specified as integers. The baseband software allocates a fixed-size buffer for this information, but does not check that the number of integers specified by the SDP is within this bound. This can lead to memory corruption when processing an acfg or pcfg attribute that contains more than 14 format types.

tags | exploit
advisories | CVE-2022-26497
SHA-256 | f7237e53d6febca38b353f2be59e9064bb4853fb37c38f9779aa9f273abc1ff6
Shannon Baseband chatroom SDP Attribute Memory Corruption
Posted May 4, 2023
Authored by Google Security Research, natashenka

Shannon Baseband suffers from a memory corruption vulnerability that occurs when the baseband modem processes SDP when setting up a call. SDP supports an attribute chatroom that allows multiple chat properties to be specified. The baseband software allocates a fixed-size buffer for these types, but does not check that the number of properties specified by the SDP is within this bound. This can lead to memory corruption when processing a chatroom attribute that contains more than 12 format types.

tags | exploit
advisories | CVE-2022-26498
SHA-256 | 8cb6ebadee250d2e79ec5b2160d5e18c8dae53fae64e54aa90dddc180b42ce0d
Shannon Baseband accept-type SDP Attribute Memory Corruption
Posted May 4, 2023
Authored by Google Security Research, natashenka

Shannon Baseband suffers from a memory corruption vulnerability that occurs when the baseband modem processes SDP when setting up a call. SDP supports an attribute accept-type that allows multiple format types to be specified. The baseband software allocates a fixed-size buffer for these types, but does not check that the number of format types specified by the SDP is within this bound. This can lead to memory corruption when processing an accept-type attribute that contains more than 12 format types.

tags | exploit
advisories | CVE-2023-24033
SHA-256 | 3e5dd3b9a11c7e00afc44d10af02f39c84d18710dc6778f472e078fbfd7d018b
Chrome SpvGetMappedSamplerName Out-Of-Bounds String Copy
Posted Apr 21, 2023
Authored by Google Security Research, Mark Brand

Chrome has an issue where there is an out-of-bounds string copy that can occur when parsing a uniform sampler name in SpvGetMappedSamplerName.

tags | exploit
advisories | CVE-2023-1534
SHA-256 | 6d914ad5ce8a9613e3083a3bd37687308877fb722821402fb41c97094ed4c0e7
Chrome GL_ShaderBinary Untrusted Process Exposure
Posted Apr 21, 2023
Authored by Google Security Research, Mark Brand

Chrome has an issue where the GL_ShaderBinary is exposed to untrusted processes.

tags | exploit
advisories | CVE-2023-1534
SHA-256 | aaac59d091c9d8a436590663b90c29e1fe3765edf9f601ab76805baa4e39f431
Chrome media::mojom::VideoFrame Missing Validation
Posted Apr 21, 2023
Authored by Google Security Research, Mark Brand

Chrome suffers from an issue where the traits for media::mojom::VideoFrame do not perform any validation on the stride and offset parameters when deserializing untrusted message data.

tags | exploit
advisories | CVE-2023-1532
SHA-256 | eef4ad83a3864cabde0b440774e63637f5458711c23fa69aeeee0b48adefd113
CentOS Stream 9 Missing Kernel Security Fix
Posted Apr 18, 2023
Authored by Jann Horn, Google Security Research

CentOS Stream 9 has a missing kernel security fix for a tun double-free amongst other missing fixes. Included is a local root exploit to demonstrate the issue.

tags | exploit, kernel, local, root
systems | linux, centos
advisories | CVE-2022-4744, CVE-2023-1249
SHA-256 | ff7d7021860395c29340e572b9c37574d2458d361ce7c71f08cc837f0834b69e
Microsoft Windows Kernel New Registry Key name Insufficient Validation
Posted Apr 13, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel has insufficient validation of new registry key names in transacted NtRenameKey.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-23420
SHA-256 | ba4961014d277f2fb882589dbc8a7ae2231b9cbad4ecebf074ca3f4b40c660cc
Microsoft Windows Kernel Transactional Registry Key Rename Issues
Posted Apr 13, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel suffers from multiple issues in the prepare/commit phase of a transactional registry key rename.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-23421, CVE-2023-23422, CVE-2023-23423
SHA-256 | 7c97ca8d9eaa67f309b42a02ec5443fcab57797d0ac534a80dbe853a97cb2939
Chrome base::SampleVectorBase::MoveSingleSampleToCounts Heap Buffer Overflow
Posted Apr 10, 2023
Authored by Google Security Research, Glazvunov

Chrome suffers from a heap buffer overflow vulnerability in base::SampleVectorBase::MoveSingleSampleToCounts.

tags | exploit, overflow
advisories | CVE-2023-1220
SHA-256 | 56c179a58f11cc0f38bddec251f01ed9bc46c971de948deee99ccf3ae1bbc48f
Chrome base::debug::ActivityUserData::ActivityUserData Heap Buffer Overflow
Posted Apr 10, 2023
Authored by Google Security Research, Glazvunov

Chrome suffers from a heap buffer overflow vulnerability in base::debug::ActivityUserData::ActivityUserData.

tags | exploit, overflow
advisories | CVE-2023-1219
SHA-256 | bf0edebf8c86d69106bb2e6045c77ad82ba926fd2ae83f98fa7a0b19855f6185
Windows Kernel Registry Key Issue
Posted Apr 10, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from multiple issues with subkeys of transactionally renamed registry keys.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-23420
SHA-256 | a73d43acd9edc53a2cab893ea9e5bb5beca43de488582970092616f1af85341c
CentOS Stream 9 Missing Kernel Security Fixes
Posted Mar 21, 2023
Authored by Jann Horn, Google Security Research

The kernel tree of CentOS Stream 9 suffers from multiple use-after-free conditions that were already patched in upstream stable trees.

tags | advisory, kernel
systems | linux, centos
advisories | CVE-2023-0590, CVE-2023-1249, CVE-2023-1252
SHA-256 | a5f94e90c58a4d65e7349c5ac6abff2cbc680f758ae71b7d0bf35a8ec6642057
Shannon Baseband NrSmPcoCodec Intra-Object Overflow
Posted Mar 20, 2023
Authored by Ivan Fratric, Google Security Research

There is an intra-object overflow in Shannon Baseband, inside the 5G SM protocol implementation (NrSmMsgCodec as it is called in Shannon according to debug strings), when decoding the Extended protocol configuration options message (IEI = 0x7B).

tags | exploit, overflow, protocol
advisories | CVE-2023-26076
SHA-256 | fbcb90e472d2e3ece0a5999daefccbac91cb16b93b5bdde7163bb7f5b46c8021
Shannon Baseband NrmmMsgCodec Intra-Object Overflow
Posted Mar 17, 2023
Authored by Ivan Fratric, Google Security Research

There is an intra-object overflow in Shannon Baseband, inside the 5G MM protocol implementation (NrmmMsgCodec as it is called in Shannon according to debug strings), specifically when handling the Service Area List message (IEI = 0x27).

tags | exploit, overflow, protocol
advisories | CVE-2023-26075
SHA-256 | ca27ff3f40a5cef1422ff326c82c6ac37d4d2a24ac33342144bc8a5c84aa2848
Shannon Baseband NrmmMsgCodec Access Category Definitions Heap Buffer Overflow
Posted Mar 17, 2023
Authored by Ivan Fratric, Google Security Research

There is a heap buffer overflow in Shannon Baseband, inside the 5G MM protocol implementation (NrmmMsgCodec as it is called in Shannon according to debug strings), specifically when handling the Operator-defined access category definitions message (IEI = 0x76).

tags | exploit, overflow, protocol
advisories | CVE-2023-26074
SHA-256 | 0d9b32ed9b931576486f7e7630f9b8e393f008ff2bccc77a8e30f84a45f1e0f0
Shannon Baseband NrmmMsgCodec Extended Emergency Number List Heap Buffer Overflow
Posted Mar 17, 2023
Authored by Ivan Fratric, Google Security Research

There is a heap buffer overflow in Shannon baseband, inside the 5G MM protocol implementation (NrmmMsgCodec as it is called in Shannon according to debug strings), specifically when handling the "Extended emergency number list" message (IEI = 0x7A).

tags | exploit, overflow, protocol
advisories | CVE-2023-26073
SHA-256 | ba04bb179ad4db118c637bfe6c329d2d3ebef7e310034bd5a8af11fa0123adc3
Shannon Baseband NrmmMsgCodec Emergency Number List Heap Buffer Overflow
Posted Mar 17, 2023
Authored by Ivan Fratric, Google Security Research

There is a heap buffer overflow in Shannon baseband, inside the 5G MM protocol implementation (NrmmMsgCodec as it is called in Shannon according to debug strings), specifically when handling the "Emergency number list" message (IEI = 0x34).

tags | exploit, overflow, protocol
advisories | CVE-2023-26072
SHA-256 | ff7c534a4bbc11dc3cd3ac7fb2571e8b2fc9cddf789fa05fff2fc30be17f2aca
XNU NFSSVC Root Check Bypass / Use-After-Free
Posted Mar 16, 2023
Authored by Google Security Research, nedwill

XNU NFSSVC suffers from root check bypass and use-after-free vulnerabilities due to insufficient locking in upcall worker threads.

tags | exploit, root, vulnerability
advisories | CVE-2023-23514
SHA-256 | dd5db6e40185f5ad1603a814730e94b92ca2cfb3086268f82937050b80986d44
Linux USB Use-After-Free
Posted Mar 13, 2023
Authored by Jann Horn, Google Security Research

Linux USB usbnet tells minidrivers to unbind while netdev is still up, causing use-after-free conditions.

tags | exploit
systems | linux
SHA-256 | a79f67a4ff4419f1ee030e5d31da09ffc097f7a7aff75a313677c344131a2bc4
Android GKI Kernels Contain Broken Non-Upstream Speculative Page Faults MM Code
Posted Mar 6, 2023
Authored by Jann Horn, Google Security Research

Android GKI kernels contain broken non-upstream Speculative Page Faults MM code that can lead to multiple use-after-free conditions.

tags | exploit, kernel
advisories | CVE-2023-20937
SHA-256 | 52bdc4d424513850282af302704976ef18a76f8dae3b5f71cf887f9e9577e262
Arm Mali CSF kbase_kcpu_command_queue Use-After-Free
Posted Feb 27, 2023
Authored by Jann Horn, Google Security Research

kbase_csf_kcpu_queue_enqueue() locks the kctx->csf.kcpu_queues, looks up a pointer from inside that structure, then drops the lock before continuing to use the kbase_kcpu_command_queue that was looked up. This is a classic use-after-free pattern, where the lookup of a pointer is protected but the protective lock is then released without first acquiring any other lock or reference to keep the referenced object alive.

tags | exploit
SHA-256 | 4fd61c0109d183f3b2a909d608ec4f7ebeb118f98b4d057a01a280c10f5a5339
Arm Mali Insufficient Cache Invalidation
Posted Feb 24, 2023
Authored by Jann Horn, Google Security Research

Arm Mali suffers from an insufficient cache invalidation for non-page-aligned user buffer imports.

tags | exploit
SHA-256 | 1cc19cb79a91228a44e5c6196c91a498b37c74f153ea14e278fe6327355cc218
XNU Race Condition / Use-After-Free
Posted Feb 14, 2023
Authored by Google Security Research, nedwill

XNU has a race condition leading to use-after-free between the NFSSVC_NFSD command and an upcall worker thread.

tags | advisory
SHA-256 | 558e5741f83f094c1d723a718badc745f6249cf15cef1cd4a50ca6eee80f69f8
Page 4 of 75
Back23456Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close