{"vulnerability": "CVE-2021-44733", "sightings": [{"uuid": "54bbf129-296e-4cb3-8d5e-c59617490544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44733", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1220", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aEnvironment with vulnerable kernel for exploitiation of CVE-2021-44733\nURL\uff1ahttps://github.com/pjlantz/optee-qemu", "creation_timestamp": "2021-12-23T18:25:38.000000Z"}, {"uuid": "5b12935d-4bdf-4d19-825a-b7500f44ca82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44733", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/143", "content": "CVE-2021-44733: Fuzzing and exploitation of a use-after-free in the Linux kernel TEE subsystem\n\nAn article about a bug in the Trusted Execution Environment subsystem. By Patrik Lantz.\n\nThe bug was found by syzkaller; descriptions are included in the article. An exploit for controlling PC is also provided along with instructions for reproducing. The exploit does not bypass PAN.", "creation_timestamp": "2021-12-28T16:53:13.000000Z"}, {"uuid": "79f8e2d1-8d8c-459d-bfe2-1ccaa77b627f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44733", "type": "seen", "source": "https://t.me/cibsecurity/34511", "content": "\u203c CVE-2021-44733 \u203c\n\nA use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-22T20:18:28.000000Z"}, {"uuid": "ca7015b3-e38b-4ec8-a96a-998e3c4b9ced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44733", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/5084", "content": "#Offensive_security\n1. Internal network honeypot for detecting if an attacker/insider threat scans your network for log4j CVE-2021-44228\nhttps://github.com/BinaryDefense/log4j-honeypot-flask\n2. Environment with vulnerable kernel for exploitation of CVE-2021-44733\nhttps://github.com/pjlantz/optee-qemu", "creation_timestamp": "2021-12-29T13:40:46.000000Z"}]}