{"uuid": "ddffd439-f5e2-48a8-9bcb-d8674ee73e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-18311", "type": "published-proof-of-concept", "source": "https://t.me/novitoll_ch/13", "content": "\u0432\u043e\u0437\u0432\u0440\u0430\u0442 \u043d\u0430 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c \u0431\u0443\u0444\u0435\u0440\u0430, \u0442\u043e \u0435\u0433\u043e \u0430\u0434\u0440\u0435\u0441 \u0441\u0442\u0430\u0442\u0438\u0447\u0435\u043d \u0438 ASLR \u043d\u0435 \u043f\u043e\u043c\u0435\u0445\u0430, \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043c\u0435\u043d\u0438\u0442\u044c \u0442\u0430\u0440\u0433\u0435\u0442 \u043a\u0443\u0434\u0430 \u043f\u0440\u044b\u0433\u043d\u0443\u0442\u044c.\n\n[1] - https://access.redhat.com/security/cve/cve-2018-18311\n[2] - https://www.usenix.org/legacy/publications/library/proceedings/sec98/full_papers/cowan/cowan.pdf\n[3] - https://lore.kernel.org/patchwork/cover/791804/\n[4] - https://www.youtube.com/watch?v=m17mV24TgwY\n[5] - https://exploit.education/protostar/stack-six/\n[6] - https://www.exploit-db.com/docs/english/17286-linux-exploit-development-part-4---ascii-armor-bypass-return-to-plt.pdf\n\n#ret2libc", "creation_timestamp": "2019-02-07T08:30:33.000000Z"}