"I apologize if my previous response was unclear or if it gave the impression that I am not capable of providing curse words" 😂
Good boy, good boy.
#ChatGPT
| https://twitter.com/fdfalcon |
"I apologize if my previous response was unclear or if it gave the impression that I am not capable of providing curse words" 😂
Good boy, good boy.
#ChatGPT
In fact there are two buffer overflows in the pr_pack() function:
* one when processing the IP header of the received packet.
* one when processing the encapsulated IP header, if the response is an ICMP packet containing an error (e.g. with ICMP type 3 - Dest. Unreachable).
Lured by
@4Dgifts
, I took a look at the new stack-based buffer overflow in FreeBSD's ping when processing ICMP responses (CVE-2022-23093): https://freebsd.org/security/advisories/FreeBSD-SA-22:15.ping.asc
TL;DR: bug doesn't seem exploitable on FreeBSD 13.1 x64, thanks to the stack layout created by variable reordering.