# Control Flow Hijack Exploit for CVE-2020-13995
Build it:
```
make
```
Run it:
```
make run
```
Mayhem it:
```
docker tag extract75-cve-2020-13955 <your name>/extract75-cve-2020-13955
docker push <your name>/extract75-cve-2020-13955
mayhem run --image <your name>/extract75-cve-2020-13955 \
--project <your name>/extract75 .
```
(Default runtime is 600 seconds; override with --duration flag)
Need more information? Contact sales@forallsecure.com
[4.0K] /data/pocs/8541fa11de7bfb73723bdcaf5e78d4d139c8ca0e
├── [2.7K] Dockerfile
├── [4.0K] exploit
│ ├── [4.0K] crashers
│ │ └── [8.0K] 5315fb378c56843434354a742b47e0c42fb8f7f82cde45c2156acbe7a7bd3a66
│ ├── [4.0K] labs
│ │ └── [4.0K] rewrite_nitf_solution.py
│ └── [4.0K] payloads
│ ├── [8.0K] 01_5315_numi_fix
│ ├── [8.0K] 02_5315_image_info
│ ├── [8.0K] 03_5315_where
│ ├── [8.0K] 04_5315_where_strncpy
│ ├── [8.0K] 05_5315_what_strncpy_CCCC
│ ├── [8.0K] 06_5315_what_errno_CCCC
│ ├── [8.0K] 07_5315_what_errno_sBuffer
│ └── [8.0K] 08_5315_what_errno_sBuffer_shell
├── [4.0K] lab
│ ├── [8.0K] 5315fb378c56843434354a742b47e0c42fb8f7f82cde45c2156acbe7a7bd3a66
│ ├── [243K] extract75
│ └── [4.0K] rewrite_nitf.py
├── [1.1K] LICENSE
├── [ 294] Makefile
├── [ 175] Mayhemfile
├── [4.0K] originals
│ ├── [600K] extract_redhat_linux.tar
│ └── [746K] extract_unix_source.tar
├── [ 460] README.md
├── [4.0K] scripts
│ └── [ 260] rewrite_errno.py
└── [4.0K] testsuite
└── [ 26M] 20091021203846-01001111-VIS.ntf.r0
8 directories, 22 files