|
|
OS X sandbox escape due to multiple heap corruption bugs in fontd (FODBReviveFromDumpFile) | |||
| Project Member Reported by ianbeer@google.com, Jan 28 2015 | Back to list | |||
See issue 235 for how to reach this function with a controlled file. FODBReviveFromDumpFile performs no bounds checking when parsing complicated attacker-controlled data. I've attached PoCs for three separate bugs here but there are many many more similar issues in this function. It appears to not have been written expecting to parse attacker-controlled data. PoCs tested against OS X 10.10.2 fontd is an unsandboxed daemon reachable from many sandboxes including chrome and safari renderer processes.
Project Member
Comment 1
by
ianbeer@google.com,
Jan 28 2015
,
Jan 31 2015
(Setting owner to ianbeer@, since he's running vendor comms for this case)
,
Apr 9 2015
,
Apr 22 2015
|
||||
| ► Sign in to add a comment | ||||