Bonfee retweetledi
Bonfee
28 posts

Bonfee
@Bonfee1
Security researcher | CTF @aboutblankets
EL3 Katılım Aralık 2020
264 Takip Edilen794 Takipçiler
Bonfee retweetledi
Bonfee retweetledi


The challenge was awesome, especially the Hyper-V VM escape part
See you in Paris 😄
Hexacon@hexacon_fr
Since we are on the home stretch, we will close the challenge on the 7/10/2022 at 20:00 GMT so you'd better hurry😊 We also have our first winner in the student category: @Bonfee1! A big shout out to him, he won fair and square his entry to Hexacon and hotel stay! #HEXACON2022
English

The bug was assigned CVE-2022-0995. Here is the exploit: github.com/Bonfee/CVE-202….
1 bit oob write is all it takes :)
English

Another Ubuntu 21.10 LPE :)
This bug doesn't even have a CVE yet. To pwn it I used the same technique described here: google.github.io/security-resea….
I'll clean the code just a bit, before releasing it
English

@Bonfee1 Nice one! Your vuln object is on the kmalloc-2k cache? Interested to know if I know this bug 😂
English

@Bonfee1 Nice one - is this another bug that was introduced in 5.x, or does it go back further?
English

@raesene @Terenceliqiang With the proper ropchain yes. If you are talking specifically about google kctf, then no because the kernel is compiled without the required CONFIG_ :(
English

@Bonfee1 @Terenceliqiang Nice! Does this one do container breakout like 2021-22555 ?
English

CVE-2022-25636 exploit - LPE on Ubuntu 21.10, using the FUSE technique ( which i first saw from @cor_ctf ).
I also developed an exploit which is not using FUSE, but for now: github.com/Bonfee/CVE-202….
I'll soon publish a writeup with the exploitation details.
English










