There are a few ways this could be abused:
- .text section (not usable as mmap allocation is not executable)
- Top of the brk heap
- .got/.data/.bss of a library
- Chunks mmaped by ptmalloc
- Thread Stacks
The bottom 4 are all feasible attacks but would require immense precision to setup. To me, the most interesting is the
chunks mmapped by ptmalloc. This is because we can likely create a use after free condition (with restrictions) on this.