8 |
|
101 |
8 |
|
101 |
7 |
|
20 |
63 | // opcode: 0x00, address: 0x65741030 64 | // uuid: 25288888-bd5b-11d1-9d53-0080c83a5c2c 65 | // version: 1.0 66 | 67 | error_status_t rpc_opnum_0 ( 68 | [in] handle_t arg_1, // not sent on wire 69 | [in] long trend_req_num, 70 | [in][size_is(arg_4)] byte overflow_str[], 71 | [in] long arg_4, 72 | [out][size_is(arg_6)] byte arg_5[], // not sent on wire 73 | [in] long arg_6 74 | ); 75 |76 | This fuzz uncovered a bunch of DoS and code exec bugs. The obvious code exec bugs were documented and released to the vendor. See also: Pedram's pwned notebook page 1, 2 and the following advisories: 77 |