Today is nine years ago since I learned how a single fixed byte write outside a heap buffer in c-ares could be used in a sequence to execute code as root on Chrome OS:
daniel.haxx.se/blog/2016/10/14…
a single byte write opened a root execution exploit
Thursday, September 22nd 2016. An email popped up in my inbox. Subject: ares_create_query OOB write As one of the maintainers of the c-ares project I'm receiving mails for suspected security problems in c-ares and this was such a one.daniel.haxx.se





🔩 Adam Štrauch
in reply to Jiří Eischmann • • •Corb_The_Lesser
in reply to Jiří Eischmann • • •Pavel Machek
in reply to Jiří Eischmann • • •Jiří Eischmann
in reply to Pavel Machek • • •AGRO TURBO.EXE SATAN 🇺🇦🇨🇿
in reply to Jiří Eischmann • • •haha, good. reminds me of that one time i've been to a prosthetist with my kid. that is the sort of person that makes various medical aid devices. he needed to take measurement of child's feet, with a device that basically resembles a rugged document scanner.
bro rushes in a bit late, apologizes, powers on the computer, has the girl take off her shoes and step on the scanner. as the computer goes through POST our collective eyeballs turn on the screen:
Installing updates: 0%
*awkward silence*
*you can step off the scanner sweetie*
Installing updates: 0%
*apologies*
*small talk*
Installing updates: 0%
Do not turn the computer off.
černý kočky nemňoukaj'
in reply to Jiří Eischmann • • •Bill
in reply to Jiří Eischmann • • •Mormegil
in reply to Jiří Eischmann • • •This is chilling (from www.jlwranglerforums.com/forum/threads/2024-4xe-l... | Hacker News
news.ycombinator.comlostinspc
in reply to Jiří Eischmann • • •Jiří Eischmann
in reply to lostinspc • • •