Conversation

This is the first Linux-kernel-host-code-execution-over-USB exploit known to me. Awesome job!
Quote Tweet
Achieving Linux Kernel Code Execution Through a Malicious USB Device; by Martijn Bogaard @jmartijnb and Dana Geist @geistdana Slides: i.blackhat.com/EU-21/Thursday
Show this thread
Exploiting a USB host from the device side is hard due to limited control: the device can only respond to host's requests. You can't simply start sending messages for heap shaping, etc. You need to find a way to make the kernel ask for those.
1
19
Replying to
Nice! Remember being happy to trigger within few minutes login screen null pointer dereference in iPAQ PDA driver w/Arduino-based USB fuzzer I cobbled together years ago. Alas, not new discovery: patched couple of months earlier after being triggered by...updated iPAQ model.😂
3