AbdulAziz Hariri
@abdhariri
Opinions expressed here are my own.
ID: 169927631
23-07-2010 14:28:03
1,1K Tweet
4,4K Followers
535 Following
New blogpost by Axel Souchet: "Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086)" doar-e.github.io/blog/2021/04/1…
CVE-2021-20226: Lucas Leong details this #Linux privilege escalation via io_uring originally submitted by @ga_ryo_. The bug leads to a UAF on any file structure, which can be leveraged for LPE in the kernel. bit.ly/3vbrOEx
#Parallels Desktop RDPMC hypercall interface and vulnerabilities: renorobert details how he found a heap overflow & a TOCTOU bug in his latest blog. zerodayinitiative.com/blog/2021/4/26…
Boom! It takes AbdulAziz Hariri less than 15 seconds to kick off #Pwn2Own Vancouver with a successful exploit of #Adobe Reader on macOS. He's off to the disclosure room to discuss the details of his research.
Confirmed! AbdulAziz Hariri used an API Restriction Bypass and a Command Injection bug to get code execution on #Adobe Reader. In doing so, he earns $50,000 and 5 Master of Pwn points. #Pwn2Own #P2OVancouver