article thumbnail

How Mayhem Helped Uncover a Security Vulnerability in RustOS (CVE-2022-36086)

ForAllSecure

The target of interest for this example comes from Philipp Opperman's amazing " BlogOS ". This data structure manages a large, linear array of memory and provides convenient access to smaller, dynamically sized chunks of that memory to callers. We can't just call Heap::deallocate , for example, with a randomly generated pointer!

article thumbnail

Six-Library Vulnerability in NGA

ForAllSecure

When examining six-library for potential entry points for fuzzing I kept the following in mind: Look for functions amenable to consuming raw binary data. Look for example or test binaries that are fuzzable. In this case the function called before readTre has the user input stream data structure on the stack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Six-Library Vulnerability in NGA

ForAllSecure

When examining six-library for potential entry points for fuzzing I kept the following in mind: Look for functions amenable to consuming raw binary data. Look for example or test binaries that are fuzzable. In this case the function called before readTre has the user input stream data structure on the stack.

article thumbnail

Information Governance Challenges and How to Address Them

Gimmal

We can do that both from various repositories and structured data, structured repositories, endpoints and the like. DEAN: There’s a long answer to that, but I would say that the shortest answer possible is that they need to be brought current into the new legislative and data privacy regime that we’re seeing out there.

article thumbnail

Serverless to the Max: Doing Big Things for Small Dollars with Cloudflare Workers and Azure Functions

Troy Hunt

I've written before about how I made this so fast so I won't go into detail again here (essentially it's a combination of Cloudflare cache, Azure Functions and Blob Storage as the underlying data structure), instead, I want to focus on the real cost of running the thing. Don't hit the origin server unless you absolutely have to!