[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability



On Fri, Feb 27, 2009 at 01:22:36PM +1100, Jubei Trippataka wrote:
> On Fri, Feb 27, 2009 at 12:26 PM, <neeko@xxxxxxxxxxxxxxxxxxx> wrote:
> 
> > BM_X-Force_WP_final.pdf is called "Application-Specific Attacks:
> > Leveraging the ActionScript Virtual Machine" and if you haven't read it,
> > you should. It'll make you smile.
> >
> >
> >
> OK, and what about this vulnerability makes use of a NULL pointer? This goes

See this --------------------------------------------------^

> to show the shallow exploitation knowledge of this community. If you
> actually understood the paper it's (NULL + offset). This is NOT the same as

and then this -------------------------^

> a plain NULL deref bug. Also, you need to be able to map the NULL address,
> so I ask again, in examples such as this, in users-space apps name one
> exploitable condition.
> 
> 
> -- 
> ciao
> 
> JT

I'll clarify for everyone since you seem lost.
EVERYONE, THE NULL POINTER DOES NOT GET DEREFERENCED. It only 
gets referenced. And Jubei isn't even sure a null pointer is involved 
at all =)

With that out of the way, I'd just like to say that I only meant to 
encourage people to check out an excellent paper. I didn't mean to say 
anything related to your argument other than to say that that 
paper is a must-read. If you can't appreciate that, why the fuck are you 
on F-D? Think about it.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/