System V shared memory segments created with shmget() are assigned an owner, a group and a set of permissions intended to limit access to the segment to designated processes only. The owner of a shared memory segment can change the ownership and permissions on a segment after its creation using shmctl(). Any subsequent processes that wish to attach to the segment can only do so if they have the appropriate permissions. Once attached, the process can read or write to the segment, as per the permissions that were set when the segment was created. smaSHeM takes advantage of applications that set weak permissions on such segments, allowing an attacker to dump or patch their contents. As discussed in the presentation at 44CON 2013 entitled 'I Miss LSD', in the case of many X11 applications it is possible to extract pixmaps of previously rendered GUI artifacts. When compiled with QtCore linking enabled, smaSHeM aids in that process by brute forcing potentially valid dimensions for the raw pixmap dump.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | smaSHeM-0.4.tgz |
NetBSD 10.0 | aarch64 | smaSHeM-0.4.tgz |
NetBSD 10.0 | aarch64eb | smaSHeM-0.4.tgz |
NetBSD 10.0 | aarch64eb | smaSHeM-0.4.tgz |
NetBSD 10.0 | alpha | smaSHeM-0.4.tgz |
NetBSD 10.0 | alpha | smaSHeM-0.4.tgz |
NetBSD 10.0 | earmv4 | smaSHeM-0.4.tgz |
NetBSD 10.0 | earmv4 | smaSHeM-0.4.tgz |
NetBSD 10.0 | earmv6hf | smaSHeM-0.4.tgz |
NetBSD 10.0 | earmv6hf | smaSHeM-0.4.tgz |
NetBSD 10.0 | earmv7hf | smaSHeM-0.4.tgz |
NetBSD 10.0 | earmv7hf | smaSHeM-0.4.tgz |
NetBSD 10.0 | i386 | smaSHeM-0.4.tgz |
NetBSD 10.0 | i386 | smaSHeM-0.4.tgz |
NetBSD 10.0 | m68k | smaSHeM-0.4.tgz |
NetBSD 10.0 | powerpc | smaSHeM-0.4.tgz |
NetBSD 10.0 | powerpc | smaSHeM-0.4.tgz |
NetBSD 10.0 | powerpc | smaSHeM-0.4.tgz |
NetBSD 10.0 | powerpc | smaSHeM-0.4.tgz |
NetBSD 10.0 | sh3el | smaSHeM-0.4.tgz |
NetBSD 10.0 | sparc64 | smaSHeM-0.4.tgz |
NetBSD 10.0 | sparc64 | smaSHeM-0.4.tgz |
NetBSD 10.0 | sparc | smaSHeM-0.4.tgz |
NetBSD 10.0 | sparc | smaSHeM-0.4.tgz |
NetBSD 10.0 | vax | smaSHeM-0.4.tgz |
NetBSD 10.0 | vax | smaSHeM-0.4.tgz |
NetBSD 10.0 | vax | smaSHeM-0.4.tgz |
NetBSD 10.0 | x86_64 | smaSHeM-0.4.tgz |
NetBSD 10.0 | x86_64 | smaSHeM-0.4.tgz |
NetBSD 9.0 | aarch64 | smaSHeM-0.4.tgz |
NetBSD 9.0 | alpha | smaSHeM-0.4.tgz |
NetBSD 9.0 | alpha | smaSHeM-0.4.tgz |
NetBSD 9.0 | earmv6hf | smaSHeM-0.4.tgz |
NetBSD 9.0 | earmv6hf | smaSHeM-0.4.tgz |
NetBSD 9.0 | earmv6hf | smaSHeM-0.4.tgz |
NetBSD 9.0 | earmv7hf | smaSHeM-0.4.tgz |
NetBSD 9.0 | earmv7hf | smaSHeM-0.4.tgz |
NetBSD 9.0 | i386 | smaSHeM-0.4.tgz |
NetBSD 9.0 | i386 | smaSHeM-0.4.tgz |
NetBSD 9.0 | m68k | smaSHeM-0.4.tgz |
NetBSD 9.0 | powerpc | smaSHeM-0.4.tgz |
NetBSD 9.0 | powerpc | smaSHeM-0.4.tgz |
NetBSD 9.0 | powerpc | smaSHeM-0.4.tgz |
NetBSD 9.0 | sparc64 | smaSHeM-0.4.tgz |
NetBSD 9.0 | sparc64 | smaSHeM-0.4.tgz |
NetBSD 9.0 | x86_64 | smaSHeM-0.4.tgz |
NetBSD 9.0 | x86_64 | smaSHeM-0.4.tgz |
NetBSD 9.3 | x86_64 | smaSHeM-0.4.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.