what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from Sergej Schumilo

First Active2015-10-07
Last Active2016-11-15
Linux Kernel Keyctl Null Pointer Dereference
Posted Nov 15, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

A malicious interaction with the keyctl usermode interface allows an attacker to crash the kernel. Processing the attached certificate by the kernel leads to a kernel nullpointer dereference. This vulnerably can be triggered by any unprivileged user locally.

tags | exploit, kernel
SHA-256 | f84b2c209822d9c15501892e2c718cb3967a4db2792d9be2b18757f3378ca33c
Linux Kernel EXT4 Memory Corruption / SLAB Out-Of-Bounds Read
Posted Nov 15, 2016
Authored by Ralf Spenneberg, Sergej Schumilo

Mounting a crafted EXT4 image read-only leads to a memory corruption and SLAB out of bounds reads (according to KASAN). Since the mounting procedure is a privileged operation, an attacker is probably not able to trigger this vulnerability on the commandline. Instead the automatic mounting feature of the GUI via a crafted USB device is required.

tags | advisory
SHA-256 | 76833a7057ed11a9603a2cca2127a14da53cfb98824820fa60de3d7cf3b821a6
Linux Kernel EXT4 Error Handling Denial Of Service
Posted Nov 1, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Mounting a crafted EXT4 image as read-only leads to a kernel panic. Since the mounting procedure is a privileged operation, an attacker is probably not able to trigger this vulnerability on the commandline. Instead the automatic mounting feature of the GUI via a crafted USB-device is required.

tags | exploit, denial of service, kernel
SHA-256 | 011b753ceacca2ffb6904932ea2a749ae06dce8d32cca4a615dce413d005e946
Linux ati_remote2 Null Pointer Dereference
Posted Mar 12, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the ati_remote2 driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-2185
SHA-256 | 64b27b582d1d98470bc99a03647730dc3ca9087a360e0d33bea3d39a03c176d3
Linux snd-usb-audio Denial Of Service
Posted Mar 12, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the snd-usb-audio driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-2184
SHA-256 | 63b99ee44c94290534a1566558fa0fa9dbffab9377972bb47e8df52a4e55a51b
Linux snd-usb-audio Null Pointer Dereference
Posted Mar 12, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the snd-usb-audio driver.

tags | exploit, kernel
systems | linux
SHA-256 | d00ca273b23d502c913f393d8f3304224d9e923c78a3ed72afd9d8358c4dd26c
Linux iowarrior Null Pointer Dereference
Posted Mar 12, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the iowarrior driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-2188
SHA-256 | cf5a8c3c5444f99bb6ad6a488d29e6cf6dcac765a5f97f7aa248611d304cb401
Linux visor (treo_attach) Null Pointer Dereference
Posted Mar 12, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the visor (treo_attach) driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-2782
SHA-256 | 38836a9f9c94e69ba7af1af7985d04a180d148018d89d5ae14f432812d3322e7
Linux powermate Null Pointer Dereference
Posted Mar 12, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of buggy USB device requiring the powermate driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-2186
SHA-256 | badce87f5987744b043fdb6d8d692d6664fa28bf648f0aa094de7b5e3c41c5fa
Linux digi_acceleport Null Pointer Dereference
Posted Mar 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the digi_acceleport driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-3140
SHA-256 | ef3cd4da9fad5010d69c5473a0734443552fa03ffe6c6259dcd1a63f6e52a21e
Linux wacom Multiple Null Pointer Dereferences
Posted Mar 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of buggy USB device requiring the wacom driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-3139
SHA-256 | 12a4cdb3b402f1acfdac5ac5bc325c540cea516465ad86e2a98b91435a6cc69d
Linux visor (treo_attach) Null Pointer Dereference
Posted Mar 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the visor (treo_attach) driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-2782
SHA-256 | 56a4919df423d8d1ced2edc350991c087f6a5b63d56610a9eb1ac25f9987628f
Linux visor clie_5_attach Null Pointer Dereference
Posted Mar 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the visor (clie_5_attach) driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2015-7566
SHA-256 | 7c2aef0ea978cdd6912da2041015ef50e879934c3c06d21f43668fd7fed52de6
Linux mct_u232 Null Pointer Dereference
Posted Mar 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the mct_u232_m8 driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-3136
SHA-256 | bb601d9a1f1ed7dfcaf7c00dc14e446a75b594c8de672d642eb7431e9e2d7356
Linux cypress_m8 Null Pointer Dereference
Posted Mar 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device which requires the requiring the cypress_m8 driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-3137
SHA-256 | ef0ff61783f9faba135ab9d60a739f12664bbf04f6053e34c17b50e4045f5349
Linux cdc_acm Null Pointer Dereference
Posted Mar 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the cdc_acm driver.

tags | exploit, kernel
systems | linux
advisories | CVE-2016-3138
SHA-256 | 74970c51108c9c527182088e5f799451e879349acff15a9808117c1634d2ccf9
Linux aiptek Null Pointer Dereference
Posted Mar 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

Linux kernel version 3.10.0-229.20.1.el7.x86_64 crashes when presented a buggy USB device using the aiptek driver.

tags | exploit, kernel
systems | linux
SHA-256 | a267f2861aa06cc9f33c4b5f5a3fe10f859f72989ebc9e954b86d65640f165ae
Prolific Ser2co64.sys Stack Buffer Overflow
Posted Feb 9, 2016
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

The Prolific ser2co64.sys driver is vulnerable to a stack buffer overflow. If a malicious USB device is presented, the buffer overflow occurs. This driver is digitally signed by Microsoft and provided via Windows Update.

tags | exploit, overflow
systems | windows
SHA-256 | 84a03321f43cdba56015676deaa534ad2999e1add9df93b109eb3d9f4a9b1dae
RedHat Enterprise Linux 7.1 Denial Of Service
Posted Oct 7, 2015
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

RedHat Enterprise Linux version 7.1 suffers from a kernel crash vulnerability on invalid USB device descriptors.

tags | exploit, denial of service, kernel
systems | linux, redhat
SHA-256 | a6c1498865a19e4b8fb98829baeba3cc2c1cf40f95da53b3d912face5dffbc85
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close