AbnormalLemmings
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
udunadan@infosec.pubM to Exploit Development@infosec.pubEnglish · 2 years ago

You have become the very thing you swore to destroy: Remotely exploiting an Antivirus engine

cfp.recon.cx

external-link
message-square
0
link
fedilink
1
external-link

You have become the very thing you swore to destroy: Remotely exploiting an Antivirus engine

cfp.recon.cx

udunadan@infosec.pubM to Exploit Development@infosec.pubEnglish · 2 years ago
message-square
0
link
fedilink
You have become the very thing you swore to destroy: Remotely exploiting an Antivirus engine 2023
cfp.recon.cx
external-link
ClamAV is an open-source antivirus engine maintained by Cisco. As it is freely available, it is widely used across a large number of software products, like email servers, and appliances. This means that if an attacker can fully compromise the AV engine running in one of those products, they could access incoming and outgoing emails and for an appliance even control the network traffic of an organization. It is well known that AV engines expose a large, externally reachable attack surface as they parse a variety of file-formats, often coming from the Internet. On the other hand, modern mitigations make the exploitation of antivirus software significantly harder because remote attackers cannot interact with the target and thus can’t leak memory addresses. This talk is a case-study of reliably exploiting CVE-2023-20032, a heap-buffer-overflow as a remote-attacker and lessons learned from it. The exploit results in remote-code-execution impact and utilizes a unique exploit-technique to bypass ASLR that can be applied to similar targets.
alert-triangle
You must log in or register to comment.

Exploit Development@infosec.pub

exploitdev@infosec.pub

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !exploitdev@infosec.pub

A curated community dedicated to strictly technical materials about vulnerability research, exploit development and reverse engineering.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 4 users / 6 months
  • 1 local subscriber
  • 458 subscribers
  • 50 Posts
  • 0 Comments
  • Modlog
  • mods:
  • udunadan@infosec.pub
  • UI: unknown version
  • BE: 0.19.11
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org