Announcement

Collapse
No announcement yet.

"Chrome Issue 992914" 32-bit conversion analysis report.

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • "Chrome Issue 992914" 32-bit conversion analysis report.

    I worked on a one-day vulnerability as a personal project for about three weeks.
    The process was produced as a ppt document.
    Now, I release the document and PoC code.
    The following links have documentation and code.

    https://github.com/AmesianX/Chrome_Issue992914


    Click image for larger version  Name:	slide_1.JPG Views:	0 Size:	86.2 KB ID:	379Click image for larger version  Name:	slide_2.JPG Views:	0 Size:	175.8 KB ID:	380Click image for larger version  Name:	slide_3.JPG Views:	0 Size:	191.9 KB ID:	378Click image for larger version  Name:	slide_4.JPG Views:	0 Size:	204.6 KB ID:	381Click image for larger version  Name:	slide_5.JPG Views:	0 Size:	301.4 KB ID:	384Click image for larger version  Name:	slide_6.JPG Views:	0 Size:	197.6 KB ID:	382Click image for larger version  Name:	slide_7.JPG Views:	0 Size:	178.3 KB ID:	385Click image for larger version  Name:	slide_8.JPG Views:	0 Size:	202.5 KB ID:	383Click image for larger version  Name:	slide_9.JPG Views:	0 Size:	236.6 KB ID:	386Click image for larger version  Name:	slide_10.JPG Views:	0 Size:	184.4 KB ID:	387Click image for larger version  Name:	slide_11.JPG Views:	0 Size:	260.6 KB ID:	390Click image for larger version  Name:	slide_12.JPG Views:	0 Size:	208.2 KB ID:	389Click image for larger version  Name:	slide_13.JPG Views:	0 Size:	255.7 KB ID:	388Click image for larger version  Name:	slide_14.JPG Views:	0 Size:	313.4 KB ID:	391Click image for larger version  Name:	slide_15.JPG Views:	0 Size:	214.5 KB ID:	392Click image for larger version  Name:	slide_16.JPG Views:	0 Size:	251.1 KB ID:	393Click image for larger version  Name:	slide_17.JPG Views:	0 Size:	216.3 KB ID:	394Click image for larger version  Name:	slide_18.JPG Views:	0 Size:	244.1 KB ID:	395Click image for larger version  Name:	slide_19.JPG Views:	0 Size:	265.8 KB ID:	397Click image for larger version  Name:	slide_20.JPG Views:	0 Size:	116.2 KB ID:	396Click image for larger version  Name:	slide_21.JPG Views:	0 Size:	123.5 KB ID:	398Click image for larger version  Name:	slide_22.JPG Views:	0 Size:	183.0 KB ID:	399Click image for larger version  Name:	slide_23.JPG Views:	0 Size:	64.4 KB ID:	400

  • #2
    My 32 bit conversion was added by a friend with the nickname "timwr" as a Metasploit module.
    I thank this friend.


    https://github.com/exodusintel/Chromium-941743/issues/2
    https://github.com/rapid7/metasploit...59de85bf45b329

    P.S:
    I would like to add modules to Metasploit, but unfortunately Metasploit is not my friend.
    I hate the Ruby language as much as Python.
    I sometimes meet Metasploit.
    Sometimes I need to write shellcode or code to bypass shellcode detection.
    That's because I need to modify my "Stephen Fewer's hash API stub in the Metasploit" code.
    For those who do research to bypass shellcode detection, what I'm saying now won't sound in alien language.


    Click image for larger version  Name:	timwr_0.png Views:	0 Size:	465.6 KB ID:	423

    Click image for larger version  Name:	timwr_1.png Views:	0 Size:	66.7 KB ID:	424

    Click image for larger version  Name:	timwr_2.png Views:	0 Size:	720.7 KB ID:	425

    Comment

    Working...
    X