upcarta
  • Sign In
  • Sign Up
  • Explore
  • Search

Revisiting CVE-2017-11176 | Bluefrostsecurity

  • Article
  • Apr 17, 2023
  • #Computersecurity
Nils Ole Timm
@Firzen14
(Author)
labs.bluefrostsecurity.de
Read on labs.bluefrostsecurity.de
1 Recommender
1 Mention
In this post we are deviating a bit from the typical format of posts on our blog and try to provide some introductory material into Android/Linux kernel exploitation. Instead of st... Show More

In this post we are deviating a bit from the typical format of posts on our blog and try to provide some introductory material into Android/Linux kernel exploitation.

Instead of starting from zero, we’ll base this post on Nicolas Fabretti’s excellent series of blogposts about CVE-2017-11176. We are assuming that you’ve read at least up to part 3 of the original blog posts;
so If you have trouble following along, we suggest revisiting the original series.

We will aim to exploit the same issue, but without any of the simplifying assumptions made in the original blog posts. In particular, we deviate from the control flow takeover exploit strategy used by Nicolas and instead implement a different, data-only, exploit strategy, which is still viable with KASLR and SMAP enabled.

With this post we hope that we can help people, who already have an understanding of the basics, take their next step towards more modern exploit strategies.

Show Less
Recommend
Post
Save
Complete
Collect
Mentions
See All
0xor0ne @0xor0ne · Jun 9, 2023
  • Post
  • From Twitter
Great blog post for learning Linux (Android) kernel exploitation (Analysis and exploitation of CVE-2017-11176) Credits @Firzen14 (@bluefrostsec)
  • upcarta ©2025
  • Home
  • About
  • Terms
  • Privacy
  • Cookies
  • @upcarta