[Info-vax] Something is happening at VSI

motk meh at meh.meh
Fri Apr 5 05:49:04 EDT 2024


On 4/04/2024 10:43 pm, Simon Clubley wrote:
> On 2024-04-04, Volker Halle <volker_halle at hotmail.com> wrote:
>> Am 04.04.2024 um 09:52 schrieb motk:
>>> On 4/3/24 10:20, motk wrote:
>>> ...
>>> I did apparently accidentally fuzz things:
>>>
>>> $ product list  *
>>>
>>>     Improperly handled condition, bad stack or no handler specified.
>>>       Signal arguments:   Number = 0000000000000005
>>>                           Name   = 000000000000000C
>>>                                    0000000000000007
>>>                                    0000000000006000
>>>                                    FFFF830007C0236B
>>>                                    0000000000000012
>>>       Register dump:
>>>       RAX = 0000000000000000  RDI = 000000007FF9DC80  RSI = 0000000000006000
>>>       RDX = 5344524F5759454B  RCX = 0000000000006000  R8  = 00000000FFFF8F86
>>>       R9  = 000000000808080D  RBX = 000000007FFABE00  RBP = 000000007FF9FF60
>>>       R10 = 000000007FFABDB0  R11 = 000000007FFA4D18  R12 = 000000007FF9C0F8
>>>       R13 = 0000000000000018  R14 = 000000007FF9C2B0  R15 = 0000000000008301
>>>       RIP = FFFF830007C0236B  RSP = 000000007FF9FF00  SS  = 000000000000001B
>>> %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual
>>> address=000000000000000C, PC=0000000000000002, PS=7AD5D8EE
>>
>> motk,
>>
>> can you reproduce this ? Over and over again ?
>>
>> If so, please consider to report this in the VSI Forum together with a
>> detailled description of your underlying software/hardware and the steps
>> to reproduce this access violation.
>>
>> https://forum.vmssoftware.com/search.php?search_id=active_topics
>>
> 
> Well that's a seriously "interesting" thing to suggest Volker. :-(
> 
> Assuming the posted output has not been edited, running a user-mode program
> resulted in the process being killed. That means it failed in either
> supervisor mode or executive mode. That means VSI need to be told _privately_
> about the sequence to reproduce (if it can be discovered) so that they can
> see if the sequence can be modified to actually exploit the system.

I can guarantee that output wasn't mangled in any way. I've been trying 
to reproduce it with no success so far. It was an extremely surprising 
result though; would it have hit a log somewhere?


> If that sequence is published in a public forum before VSI have analyzed
> and fixed the problem, it means anyone else will be able to perform the
> same analysis to see if the problem can be exploited. :-(

Fuzzing tools are free and plentiful.


> Simon.


-- 
motk




More information about the Info-vax mailing list