FYI: Fwd: [Dailydave] CANVAS SYSRET Module
- From: Oliver Pinter <oliver.pntr@xxxxxxxxx>
- Date: Tue, 19 Jun 2012 00:16:14 +0200
---------- Forwarded message ----------
From: Alex McGeorge <alexm@xxxxxxxxxxxxxxx>
Date: Mon, 18 Jun 2012 10:10:09 -0400
Subject: [Dailydave] CANVAS SYSRET Module
To: dailydave@xxxxxxxxxxxxxxxxxxxxx, canvas@xxxxxxxxxxxxxxxxxxxxx
There has been a lot of talk about the SYSRET vulnerability  recently
and even some pretty good write ups . Of course the best discussion
of this bug will undoubtedly come from Rafal at his BlackHat talk in
For those of you who are eager to see an exploit for this vulnerability
in action we've got you covered:
http://partners.immunityinc.com/movies/SYSRET-v2.mov . The exploit has
been available since Friday to CANVAS Early Updates (CEU) customers for
their FreeBSD privilege escalation pleasure, courtesy of our Unix
exploit development team. For CEU inquiries please email
We were chatting about this on Friday, do other people see FreeBSD in
the enterprise on pen-tests? Outside of a few NAS solutions I've seen it
employed in source control and for other important tasks (DNS, FTP). Now
that Linux is so common place is FreeBSD considered exotic?
1130 Washington Avenue 8th Floor
Miami Beach, Florida 33139
freebsd-security@xxxxxxxxxxx mailing list
To unsubscribe, send any mail to "freebsd-security-unsubscribe@xxxxxxxxxxx"
- Prev by Date: Update for FreeBSD Security Advisory FreeBSD-SA-12:04.sysret for 8.1
- Next by Date: Default password encryption method.
- Previous by thread: Update for FreeBSD Security Advisory FreeBSD-SA-12:04.sysret for 8.1
- Next by thread: Default password encryption method.