Search K
Appearance
Appearance
Other ways to support HackTricks:
prev_size
data, which is part of the current chunk (at the end)A
fake chunk is created inside a chunk controlled by the attacker pointing with fd
and bk
to the original chunk to bypass protectionsB
and C
) are createdB
one the prev in use
bit is cleaned and the prev_size
data is overwritten with the difference between the place where the C
chunk is allocated, to the fake A
chunk generated before prev_size
and the size of the fake chunk A
must be the same to bypass checks.C
is freed so it consolidates with the fake chunk A
D
is created which will be starting in the fake A
chunk and covering B
chunkB
's fd
is overwritten making it point to the target address abusing the D
chunk (as it contains B
inside) and B
is freed to add the target to the fast bin Other ways to support HackTricks: