#memorycorruption

kriware :verified:kriware@infosec.exchange
2026-03-09

PHP 8 Sandbox Escape via TimeAfterFree UAF

A PoC demonstrates a PHP 8 use-after-free bug enabling bypass of disable_functions and execution of system commands on Unix-like servers.

github.com/m0x41nos/TimeAfterF

#PHP #MemoryCorruption

Rene Robichaudnerowild
2025-10-14
N-gated Hacker Newsngate
2025-04-18

Oh joy, another thrilling in the world of ASN.1 for . 🙄 Because nothing screams excitement like deep dives into protocols and the potential for catastrophic memory corruption, right? 🎉
blog.trailofbits.com/2025/04/1

2024-08-24

🧠 Why exploits prefer memory corruption | PACIBSP security

「 I believe that memory corruption techniques will dominate real-world exploitation that targets end-user platforms and products even after the shift to memory-safe languages makes memory unsafety bugs rarer than logic bugs. And I do not expect MTE to change this: it will just make good memory corruption bugs even rarer and harder to exploit 」

pacibsp.github.io/2024/why-exp

#exploits #memorycorruption #memorysafety #cybersecurity

2024-08-22

NSPasteboard crashes due to unsafe, internal concurrent memory mutation when handling file promises

This is a public reposting of FB14885505, in case it's helpful to anyone else or especially in case someone else has seen this too and knows how to work around it.

NSPasteboard mutates itself simultaneously from the main thread and the global concurrent Dispatch pool, w.r.t. to its internal type cache. This is surprisingly trivial to reproduce (sample code below) by just dropping, e.g. a file promise (such as by opening a PNG in Preview, revealing the thumbnails sidebar, and then dragging [...]

wadetregaskis.com/nspasteboard

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2024-07-11

High-Impact Security Vulnerabilities in Firefox 128

Date: July 9, 2024
CVE: CVE-2024-6605 CVE-2024-6606 CVE-2024-6607 CVE-2024-6608 CVE-2024-6609 CVE-2024-6610 CVE-2024-6600 CVE-2024-6601 CVE-2024-6602 CVE-2024-6603 CVE-2024-6611 CVE-2024-6612 CVE-2024-6613 CVE-2024-6614 CVE-2024-6604 CVE-2024-6615
Vulnerability Type: Tapjacking
CWE: [[CWE-451]], [[CWE-922]]
Sources: Mozilla Security Advisory

Synopsis

Multiple security vulnerabilities were addressed in the latest Firefox 128 release, impacting both the desktop and Android versions. These vulnerabilities, if exploited, could lead to severe security breaches including tapjacking, out-of-bounds read, and memory corruption.

A list of all the CVEs mentioned in the Mozilla Foundation Security Advisory 2024-29:

  1. CVE-2024-6605: Firefox Android missed activation delay to prevent tapjacking (High)
  2. CVE-2024-6606: Out-of-bounds read in clipboard component (High)
  3. CVE-2024-6607: Leaving pointerlock by pressing the escape key could be prevented (Moderate)
  4. CVE-2024-6608: Cursor could be moved out of the viewport using pointerlock (Moderate)
  5. CVE-2024-6609: Memory corruption in NSS (Moderate)
  6. CVE-2024-6610: Form validation popups could block exiting full-screen mode (Moderate)
  7. CVE-2024-6600: Memory corruption in WebGL API (Moderate)
  8. CVE-2024-6601: Race condition in permission assignment (Moderate)
  9. CVE-2024-6602: Memory corruption in NSS (Moderate)
  10. CVE-2024-6603: Memory corruption in thread creation (Moderate)
  11. CVE-2024-6611: Incorrect handling of SameSite cookies (Low)
  12. CVE-2024-6612: CSP violation leakage when using devtools (Low)
  13. CVE-2024-6613: Incorrect listing of stack frames (Low)
  14. CVE-2024-6614: Incorrect listing of stack frames (Low)
  15. CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (High)
  16. CVE-2024-6615: Memory safety bugs fixed in Firefox 128 (High)

Issue Summary

Mozilla announced fixes for several high-impact vulnerabilities in Firefox 128. Notably, CVE-2024-6606 which involves out-of-bounds read issues in the clipboard component, and CVE-2024-6609 related to memory corruption in the NSS library.

Technical Key Findings

CVE-2024-6605 allows attackers to overlay malicious prompts over legitimate permission dialogs, potentially tricking users into granting unwanted permissions. This vulnerability exploits the lack of a delay in activating permission prompts on Firefox Android, enabling immediate interactions which can be hijacked by malicious actors.

Vulnerable Products

  • Firefox versions prior to 128
  • Firefox ESR versions prior to 115.13
  • Firefox Android versions prior to 128

Impact Assessment

If these vulnerabilities are exploited, attackers can perform actions such as reading out-of-bounds data, preventing users from exiting fullscreen mode, or executing arbitrary code. These can lead to unauthorized access to sensitive data, manipulation of browser behavior, and potential system compromises.

Patches or Workaround

Mozilla has released patches in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 to address these vulnerabilities. Users are advised to update to the latest versions to mitigate the risks associated with these security flaws.

Tags

#Firefox #CVE2024-6605 #Tapjacking #SecurityUpdate #Mozilla #Vulnerability #MemoryCorruption #OutOfBoundsRead

2024-05-25

I wrote some [intentionally vulnerable] C code. Looking for recommendations on how to make it easier for students to exploit this simple Stack Overflow.
github.com/ronin-rb/vuln-apps/
#memorycorruption #stackoverflow #pwnme

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2024-05-21

Critical Vulnerability in Fluent Bit: CVE-2024-4323

Date: May 20, 2024
CVE: CVE-2024-4323
Vulnerability Type: Memory Corruption
CWE: [[CWE-787]], [[CWE-119]]
Sources: Tenable

Issue Summary

Tenable Research has identified a critical memory corruption vulnerability in Fluent Bit, designated CVE-2024-4323, within its built-in HTTP server. This vulnerability, termed "Linguistic Lumberjack," affects versions 2.0.7 through 3.0.3 and allows potential denial of service, information disclosure, or remote code execution. The issue has been fixed in the main branch and will be included in the upcoming 3.0.4 release.

Technical Key Findings

The vulnerability is rooted in improper handling of data types in the "inputs" array of the /api/v1/traces endpoint. When non-string values, such as integers or negative integers, are passed, it can lead to memory corruption. Exploits could include crashes from wild copies, heap overwrites, and disclosure of adjacent memory, potentially leading to remote code execution under specific conditions.

Vulnerable Products

  • Fluent Bit versions 2.0.7 to 3.0.3

Impact Assessment

Exploitation of CVE-2024-4323 can result in significant disruptions such as service crashes, leakage of sensitive information, and in severe cases, remote code execution, which can compromise entire systems relying on Fluent Bit for logging and monitoring.

Patches or Workarounds

Users should upgrade to Fluent Bit version 3.0.4 or later. If upgrading is not immediately feasible, restricting access to the vulnerable endpoints is recommended to mitigate potential exploitation.

Tags

#CVE-2024-4323 #FluentBit #MemoryCorruption #CloudSecurity #RemoteCodeExecution #VulnerabilityManagement

2024-02-06

What are your thoughts on this?

Unpopular opinion: I'm for memory-safe langs, but there needs to be some realism. Even with Rust/C#/Python, a lot of orgs still use C/C++ and colleges still teach C/C++.

It's great some level of reduction occurred, but this is ultimately something that will take time. It's not something I think anyone expects to see poof into non-existence in one year.

Mem issues were the 2nd leading cause of vulns?

Yea, that's not surprising, despite this myth mem corruption is just gone with the wind. It isn't.

"...75% of analyzed mem vulnerabilities have been exploited as 0-days by threat actors..."

Real talk: This is because of their ability to RCE. NO CAP.

Also, the list implies # of vulns is relative to impact: It isn't

NOTE: I do like cpp, so I'm not like trying to harp on it or anything. There have been so many improvements to it, that I feel this should be noted.

horizon3.ai/analysis-of-2023s-

#memorycorruption #hacking #infosec #programming #programmers

Peter N. M. Hansteenpitrh
2023-09-12

p2k23 Hackathon Report: Landry Breuil (landry@) on chasing memory corruptions undeadly.org/cgi?action=articl

DeepSec Conference ☑deepsec@social.tchncs.de
2023-08-31

DeepSec 2023 Talk: Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption – Shubham Dubey
Memory corruption, a vulnerability that emerged in the 1980s and gained prominence with the discovery of the first buffer overflow in the fingerd U
blog.deepsec.net/deepsec-2023-
#Conference #DeepSec2023 #MemoryCorruption #Talk #VulnerabilityMitigation

2023-08-09

Sometimes, #bugs lead to pretty funny results. In this case, I was processing this #calibration data for our #multispectral #camera again and apparently, I effed up my memory management, which lead to memory corruption and ultimately this funny picture of me. Unfortunately, I was unable to reproduce the bug, so, I guess it'll live on as a funny edge case in my program :)

#science #multispectralimaging #multispectralcamera #freiburg #programming #memorymanagement #memorycorruption

रञ्जित (Ranjit Mathew)rmathew
2021-01-04
2020-02-18

Vulnerability Spotlight: Memory corruption, DoS vulnerabilities in CoTURN - Aleksandar Nikolic of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.CoTURN contains... more: feedproxy.google.com/~r/feedbu #vulnerabilityadvisories #vulnerabilityspotlight #vulnerabilityresearch #vulnerabilityreport #memorycorruption #denialofservice #vulnerabilities #coturn

2020-02-12

Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs - The release of Firefox 73 fixed high-severity memory safety bugs that could cause arbitrary code e... more: threatpost.com/mozilla-firefox #highseverityflaw #memorycorruption #vulnerabilities #mozillafirefox #codeexecution #missingbounds #memorysafety #websecurity #firefox73 #mozilla

2019-12-04

Microsoft looks to Rust language to beat memory vulnerabilities - Microsoft is pressing ahead with an ambitious plan to de-fang common vulnerabilities hiding in old... more: nakedsecurity.sophos.com/2019/ #microsoftvulnerabilities #microsoftprojectverona #memorycorruption #technologies #microsoft #firefox #mozilla #windows #rust

2019-11-07

Amazon Kindle, Embedded Devices Open to Code-Execution - Flaws in Das U-Boot affect third-party hardware that uses the universal bootloader as an underlyin... more: threatpost.com/amazon-kindle-e #memorycorruption #vulnerabilities #denialofservice #embeddeddevices #bufferoverflow #codeexecution #amazonkindle #forallsecure #cputakeover #armdevices #doublefree #dasu-boot #iot

2018-10-10

#memoryCorruption
#trap

RadStudioのスマートポインタは本当にスマートポインタなのか。

C++ Builderの古いバージョンではスマートポインタ関連の不具合はあった。

自分が使っているRadStudioでもそういうバグがあるかもしれない。

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst