Opens profile photo
Follow
Click to Follow littlelailo
littlelailo
@littlelailo
interested in RE and pwning stuff | hacking *OS atm
ROMJoined September 2015

littlelailo’s Tweets

Thx to someone (thx!) I now know that Apple also did this in the past for CVE-2020-3858/-9974/-3831 and CVE-2021-30674 which are all in kexts but got attributed to the kernel. So I guess that we won't see this getting "fixed" in the advisory :(
19
Show this thread
I didn't get around to build a crasher PoC (yet?) so I also can't say with 100% certainty that this is a security relevant diff, but static analysis makes it look like one (the index is now checked, while it was previously unchecked -> trivial OOB write) 3/
1
11
Show this thread
I obviously can't say for certain that this is actually the fix for this CVE (only Apple could confirm), but multiple people have diffed the main kernel and found nothing other than exploit mitigations so it's probably it. 2/
1
10
Show this thread
CVE-2022-32894 seems to be another DCP vulnerability (look for `IOP Buffer array length exceeded`) where Apple (purposely?) mislabeled the vulnerable component in their security advisor (it says Kernel while it's actually in AppleFirmwareKit). 1/
3
101
Show this thread
age += 1; I'm not longer a teen and start to feel old :P Last year was definitely a lot of fun & I learned a lot. Really missed the cons tho so I'm looking forward for them this year (finally 🎉)
14
77
🤯 this is super awesome wow
Quote Tweet
Not sure if this is widely known, but you can go to storage.googleapis.com/syzkaller/cove and click on any file and line in the kernel that syzkaller/syzbot knows how to reach and it will give you the smallest testcase that reaches it.
Show this thread
Screenshot of syzkaller coverage website
15
but all accesses we could find are bounds checked. Did anyone else also look into it and found an interesting field to corrupt? Or has anyone links to a project that allows fine control over the h264 NAL units so that we could emit different pattern to see if sth crashes? 3/3
1
11
Show this thread
We also reversed a lot of the structures surrounding the bug and it seems like you can either corrupt an adjacent SPS block or the first PPS block (by overflowing from the last SPS into it). There are a couple of interesting fields in there (indexes into other arrays) 2/3
1
13
Show this thread
Finally got around to diff 15.5 b1 vs b2 and found this nicely tweetable bug: int f = open("/dev/rmd0", O_RDWR); uint64_t * x = malloc(0x4000); for (uint64_t i = 0;;i += 0x4000) pread(f,x,0x4000,-i); Decided to tweet it since it needs a ramdisk, root and unsbxed code exec
10
206
Show this thread
Super awesome presentation I’ll publish my write up/blackbird.txt in the next few days :) Finding and loosing two ROM bugs in one year feels bittersweet, but it’s super cool that I can talk about it now. (To avoid confusion - we found it independent and liked my name)
Quote Tweet
enjoy "blackbird" 🐦 raw.githubusercontent.com/windknown/pres
4
101
Show this thread
this.isminor = false; holy shit what a year! Thanks again to everybody who supported and helped me, let’s see what next year brings :)
17
59
New ROM -> new bugs? ;p apple why the hell do you think this is a good idea lol
Quote Tweet
Apple planning over-the-air OS recovery for iOS devices based on iOS 13.4 beta code 9to5mac.com/2020/02/26/app by @filipeesposito
Image
5
168
What a ride. As you can see I didn't put much more work in after I found checkm8/apollo in march, I hope someone can build upon it or build upon acorn, but unfortunately even now I won't have the time because I need to prepare for finals :/ btw spice is an anagram for ipsec
Quote Tweet
We opensourced Spice @ github.com/JakeBlair420/S
4
65
Question to the crypto ppl: is there a known attack on AES, that deals with the fact that the same key is used for an AES128/192 and AES256 encryption (talking about CPA attacks and one half of the 256 bit key == 128 bit key). Just wonderd what the complexity of such an attack is
4
26
Show this thread
2019 has been a really cool year. I found some good bugs, met awesome ppl and had a lot of fun in the IT world as well as the "real" world. Thanks to all the people who help me achieving my dreams and let's see what the next decade offers!
1
45
Historical moment! Highest amount of #ra1n ever recorded since the beginning of weather records! Truely phenomenal! #checkra1n checkra.in
Quote Tweet
checkra1n beta 0.9 is now available at checkra.in! - this is an early release and as such you should not be running it on a primary release. please read the FAQ on the website for additional information. reddit: reddit.com/r/jailbreak/co
Show this thread
17
605
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).
962
15.3K
Show this thread