5 May 2017
In kernel-programming we should avoid doing call_usermodehelper() which allows to execute a command from kernel-space. And sometimes we even want to call this function within a systemcall. Normally, we really don’t wanna do this. But, desperate times require extraordinary methods.
21 April 2017
I am currently writing a work about containers and I found this amazing blog which explains containers in 500 lines of code(and about 3000 lines of very well structured text). I can definitely recommend Lizzies-Blog.
14 April 2017
Eric Dumazet of Google found a very dangerous remote execution bug in the Linux Kernel. It’s located in the recv-syscall with the MSG_PEEK-flag set. Attackers can remotely execute code on the target..
I used a google-dork to find vulnerable software:
MSG\_PEEK filetype:c
And found some possible targets:
20 March 2017
The latest wikileaks revealings gave also insights about an interesting bug in cisco products. No I am not talking about the bug in the Cisco Cluster Management Protocol (CMP). I am talking about the open telnet ports.Ten years ago it was already recommended to use ssh instead and there are still so many devices out there with open telnet ports. Now it really is time to close them.
3 March 2017
During my research about update mechanisms of open-source software I discovered vulnerabilities in OpenElec.
Overview
- System affected: OpenElec
- CVE: CVE-2017-6445
- Vulnerable component: auto-update feature
- Software-Version: 6.0.3, 7.0.1
- User-Interaction: Reboot required
- Impact: Remote Code Execution with root permission
13 February 2017
If I enable postscreen on a Debian-Host I’ll get this strange message in my mail.log:
Feb 13 08:38:37 tardis postfix/postscreen[17453]: close database /var/lib/postfix/postscreen_cache.db: No such file or directory (possible Berkeley DB bug)
It looks like the postscreen_cache.db-file is located in /var/lib/postfix instead of the postfix-jail /var/spool/postfix/var/lib/postfix. So we can fix it by moving the file into the jail:
10 February 2017
I am not good at writing. So writing a scientific work is a bit challenging for me. That’s why I pimped up the task by choosing the right tools and made it more exciting for me.
10 February 2017
Spell checking in vim is very easy and just needs the following command:
:set spell spelllang=en_us
This will highlight all misspelled words. To turn off the spell checker just type in command-mode:
:set nospell
For german language we need a few files:
mkdir -p $HOME/.vim/spell
wget -P ~/.vim/spell/ http://ftp.vim.org/vim/runtime/spell/de.utf-8.spl
wget -P ~/.vim/spell/ http://ftp.vim.org/vim/runtime/spell/de.utf-8.sug
Now we can use the following vim-command to enable the german spell checker:
:set spell spelllang=de