Closed sskras closed 3 years ago
Hi sskrs, thank you for the suggestion. I looked into making this change but as this is for an older version of gcc it would require re-writing portions of the exploit code to prevent errors in later versions of gcc from 8 onwards. Thank you for the suggested fix, if someone wishes to compile it with older versions of gcc then they can apply the -std=c99 argument to the compile flags.
Hi blacklat, depending on the hypervisor in use and arbitrarily on some hardware the base address of components such as the libc virtual address may be offset - this is documented and described behavior in our blog post which you can read through to understand how the exploit works and port it to your own target if needed. We have successfully used this exploit across numerous systems and hypervisors, unlike the metasploit module which uses ret-into-libc and has only a single address to calculate an offset for, our exploit uses ROP chains which use many hardcoded addresses that can be disrupted. The exploit has failed for you due to this known behavior which is still being investigated as the cause for the address change is not known as described in our blog here - https://hacker.house/lab/cve-2020-18471/
The mentioned addition is enough for compilation to succeed: