Hacking Team
Today, 8 July 2015, WikiLeaks releases more than 1 million searchable emails from the Italian surveillance malware vendor Hacking Team, which first came under international scrutiny after WikiLeaks publication of the SpyFiles. These internal emails show the inner workings of the controversial global surveillance industry.
Search the Hacking Team Archive
Linux USB pwn
Email-ID | 227462 |
---|---|
Date | 2013-09-12 08:26:55 UTC |
From | [email protected] |
To | [email protected], [email protected], [email protected], [email protected], [email protected] |
Received: from relay.hackingteam.com (192.168.100.52) by EXCHANGE.hackingteam.local (192.168.100.51) with Microsoft SMTP Server id 14.3.123.3; Thu, 12 Sep 2013 10:26:49 +0200 Received: from mail.hackingteam.it (unknown [192.168.100.50]) by relay.hackingteam.com (Postfix) with ESMTP id 11C43628CC for <[email protected]>; Thu, 12 Sep 2013 09:24:14 +0100 (BST) Received: by mail.hackingteam.it (Postfix) id C6C612BC1A4; Thu, 12 Sep 2013 10:26:49 +0200 (CEST) Delivered-To: [email protected] Received: from [172.20.20.164] (unknown [172.20.20.164]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.hackingteam.it (Postfix) with ESMTPSA id B1A072BC1A3; Thu, 12 Sep 2013 10:26:49 +0200 (CEST) Message-ID: <[email protected]> Date: Thu, 12 Sep 2013 10:26:55 +0200 From: Ivan Speziale <[email protected]> User-Agent: Mozilla/5.0 (X11; Linux i686; rv:10.0.12) Gecko/20130116 Icedove/10.0.12 To: Marco Valleri <[email protected]>, Antonio Mazzeo <[email protected]>, Diego Giubertoni <[email protected]>, Guido Landi <[email protected]>, Fabio Busatto <[email protected]> Subject: Linux USB pwn X-Enigmail-Version: 1.4.1 Return-Path: [email protected] X-MS-Exchange-Organization-AuthSource: EXCHANGE.hackingteam.local X-MS-Exchange-Organization-AuthAs: Internal X-MS-Exchange-Organization-AuthMechanism: 10 Status: RO X-libpst-forensic-sender: /O=HACKINGTEAM/OU=EXCHANGE ADMINISTRATIVE GROUP (FYDIBOHF23SPDLT)/CN=RECIPIENTS/CN=IVAN SPEZIALE06F MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="--boundary-LibPST-iamunique-1097933725_-_-" ----boundary-LibPST-iamunique-1097933725_-_- Content-Type: text/plain; charset="ISO-8859-1" "A local user with physical access to the system could use this flaw to crash the system resulting in DoS or, potentially, escalate their privileges on the system." "Linux kernel built with the Human Interface Device bus (CONFIG_HID) support is vulnerable to a memory corruption flaw. It could occur if an HID device sends malicious HID report with the Report_ID of greater than 255." http://www.immunityinc.com/ceu-index.shtml: - Source code to build a teensy++ board based exploit for (CVE-2013-2888) - Paper on how to practically exploit the Linux core HID driver vulnerability (CVE-2013-2888) Ivan -- Ivan Speziale Senior Software Developer Hacking Team Milan Singapore Washington DC www.hackingteam.com email: [email protected] mobile: +39 3669003900 ----boundary-LibPST-iamunique-1097933725_-_---