I'm doing a demonstration of memory corruption attacks, and would like to show some working examples of exploits that feature heap corruption (such as use-after-free). My requirements are:
- A working exploit (remote or local)
- on Linux (this is crucial, because I want to take people through it using Linux tools)
- for a real application (i.e. not a dummy application made to be vulnerable, but something real)
- that can be easily downloaded (open source, still available -- older versions are fine)
Preferably, I'd like:
- an application that they've heard of (something fairly common, not something obscure)
- with a metasploit exploit available
- and, if possible, a server application or daemon (not a browser)
Surprisingly, I'm having trouble finding a good example. Can you recommend a good example to use to teach and demonstrate heap corruption attacks? The main requirement is that an exploit should be available that works on a real Linux application.
UPDATE: Before posting, I searched exploitdb and metasploit, and was unable to find something that met even the requirements (let alone the desired points). However, the search interfaces there are somewhat coarse, so there may be one lurking that I can't find.