risesecurity.com - Redirecting...

Example domain paragraphs

risesecurity Blog Home About Advisories Articles Exploits Metasploit Projects Vulnerabilities risesecurity Home Home 2009 2009 Illustrating the Linux sock_sendpage() NULL Pointer Dereference on Power/Cell BE Architecture About Advisories Articles Exploits Metasploit Metasploit Auxiliary modules Exploit modules Payload modules Projects Vulnerabilities Illustrating the Linux sock_sendpage() NULL Pointer Dereference on Power/Cell BE Architecture ¶ Aug 31, 2009 · Sep 10, 2009

We wrote an exploit for the Linux kernel sock_sendpage NULL pointer dereference vulnerability , discovered by Tavis Ormandy and Julien Tinnes, to illustrate the exploitability of this vulnerability on Linux running on Power/Cell BE architecture -based processors.

The exploit uses the SELinux policy and the mmap_min_addr protection issue (CVE-2009-2695) to exploit this vulnerability on Red Hat Enterprise Linux 5.3 and CentOS 5.3. The problem, first noticed by Brad Spengler, was described by Red Hat in the Red Hat Knowledgebase article: Security-Enhanced Linux (SELinux) policy and the mmap_min_addr protection (CVE-2009-2695)

Links to risesecurity.com (5)