Vulnerabilities tagged "binary"

Parallels Desktop Guest to Host Escape

Straight forward version is two Out-Of-Bounds accesses in reading and writing the `Driver feature set`. A guest provided value is stored, and then used as an array index without any validation both in `PciVirtIOWriteMM` and in `PciVirtIOReadMM` giving relative read/write primitives.
 

Kernel Vmalloc Use-After-Free in the ION Allocator

A Use-After-Free in Android's ION Allocator used by the kernel for DMA buffers that can be shared across user/kernel/device boundaries.The issue starts from the `DMA_BUF_IOCTL_SYNC` that is exposed by the buffer's file descriptor, this IOCTL can arbitrarily increment or decrement the reference counter for the shared buffer...
 

Nitro Pro PDF JavaScript document.flattenPages JSStackFrame stack-based use-after-free vulnerability

This Talos report covers a non-trivial issue where a stack pointer is used after it went out of scope when invoking JS bindings, which are provided to document creators by Nitro Pro PDF for automating aspects of the document.When one of these bindings needs to be executed by the SpiderMonkey library, the `js32u.dll!js_Invoke` function is used to create stack space and push a `JSStackFrame` object to be used by the invoked binding...