Finding bugs that turn out to be useless can be demoralising but usually finding those means you’re on the right track!
Remember: The road to exploitable bugs is paved with unexploitable bugs
| https://twitter.com/fdfalcon |
Finding bugs that turn out to be useless can be demoralising but usually finding those means you’re on the right track!
Remember: The road to exploitable bugs is paved with unexploitable bugs
"I apologize if my previous response was unclear or if it gave the impression that I am not capable of providing curse words" 😂
Good boy, good boy.
#ChatGPT
In fact there are two buffer overflows in the pr_pack() function:
* one when processing the IP header of the received packet.
* one when processing the encapsulated IP header, if the response is an ICMP packet containing an error (e.g. with ICMP type 3 - Dest. Unreachable).
Lured by
@4Dgifts
, I took a look at the new stack-based buffer overflow in FreeBSD's ping when processing ICMP responses (CVE-2022-23093): https://freebsd.org/security/advisories/FreeBSD-SA-22:15.ping.asc
TL;DR: bug doesn't seem exploitable on FreeBSD 13.1 x64, thanks to the stack layout created by variable reordering.