WikiLeaks CIA Exploits: FreeBSD References Within

Dag-Erling Smørgrav des at des.no
Wed Mar 8 15:52:09 UTC 2017


grarpamp <grarpamp at gmail.com> writes:
> https://search.wikileaks.org/?q=freebsd
>
> Currently returns many pages similarly named...
>
> "Shell Code Database
> This page includes local links to a shellcode
> database discovered at shell-storm.org."

That doesn't indicate a vulnerability.  Shell code is what you use to
exploit a remote code execution vulnerability once you've found it.  It
usually needs to be tailored to the target operating system, sometimes
to the exact environment and to the application used to inject it, so it
makes sense that a shell code database would reference FreeBSD.

> [...] it makes sense to establish ongoing search and review of this
> dataset for any as yet unfixed exploits.

Note to anyone thinking of getting involved in this: depending on your
jurisdiction and employment situation, downloading material from the CIA
dump may be illegal and / or a firing offense.  Simply browsing it
online may or may not be safe; get legal advice before you do.  IANAL.

DES
-- 
Dag-Erling Smørgrav - des at des.no


More information about the freebsd-questions mailing list