[Date Prev][Date Next][Thread Prev][Thread Next]
[Date Index]
[Thread Index]
- Subject: Re: Found heap-buffer-overflow with grammar-based fuzzer
- From: Xmilia Hermit <xmilia.hermit@...>
- Date: Thu, 16 Mar 2023 16:30:03 +0100
Alexander Chernoskutov:
Could someone please assess, is this bug exploitable from the security
point of view? Is it possible to potentially escape the interpreter
and run arbitrary code (on a system with no memory protection), or
memory corruption is unpredictable?
This can likely be used to get arbitrary code execution with a prepared
heap memory layout. However, when allowing untrusted code to load binary
Lua chunks, they can get arbitrary code execution in other (easier) ways
too. Therefore, sandboxes that already disabled the loading of binary
Lua chunks for security should not be affected.
Regards,
Xmilia