Posts
3391
Following
713
Followers
1581
"I'm interested in all kinds of astronomy."
repeated

It looks like the "major" AMD vulnerability that @taviso reported had leaked has now been disclosed.

The vulnerability, with a 7.2 severity rating, allows hackers to bypass Secure Encrypted Virtualization—a protection that provides the cryptographic means for certifying that a VM hasn’t been compromised by anyone who may have had access to the physical machine running the vulnerable AMD chip. The patch comes in the form of microcode that presumably will be provided by the device OEM.

https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html

0
5
0
repeated

Google Android zero-day: Android Security Bulletin February 2025
46 CVEs in Framework (1 critical, 45 high severity) cc: @buherator

Note: There are indications that CVE-2024-53104 may be under limited, targeted exploitation.

0
2
0
repeated

Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!
https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w

3
12
0
repeated

Qualcomm: February 2025 Security Bulletin
Qualcomm has 7 propriety vulnerabilities (1 critical, 5 high, 1 medium severity) and 17 open source vulnerabilities (1 critical, 9 high, 7 medium). That critical vulnerability CVE-2024-49837 (7.8 high) is Improper Validation of Array Index in Automotive OS Platform QNX. No mention of exploitation. h/t @cR0w

0
2
0
[RSS] Exploit Development: Investigating Kernel Mode Shadow Stacks on Windows

https://connormcgarr.github.io/km-shadow-stacks/
0
0
1
repeated
repeated

Today's insanity:

4
7
0
repeated

What is the origin of the word "mainframe"? Digging through archives, I traced it back to 1953. The IBM 701 computer was built from "frames": power frames, a storage frame, a drum frame, and the main frame. This 1953 drawing from the Installation Manual shows the dimensions of the "main frame". 1/n

4
19
0
repeated

Dog with Glasses Plushie neodog_glasses waow

New way to get customer support just dropped

2
14
1
[RSS] TRAVERTINE - An absolutely wild race condition in the macOS kernel (CVE-2025-24118)

https://jprx.io/cve-2025-24118/
0
1
1
[RSS] Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793)

https://starlabs.sg/blog/2025/12-mali-cious-intent-exploiting-gpu-vulnerabilities-cve-2022-22706/
0
0
2
repeated

“For Sale: Binaries Compiled From Hand-Crafted Artisanal Code”

https://jasonbrownlee.me/blog/posts/hand-crafted-code/

0
2
0
repeated

So Apple has open-sourced the XCBuild system used internally by Xcode as Swift-Build: https://github.com/swiftlang/swift-build

Based on their previously open-source llbuild project.

It includes support for Windows and Linux (using clang-cl on Windows), but does not currently seem to have a way to make use of it outside of Swift package manager or Xcode.

0
3
0
repeated

Coming up this weekend: PE & Mitra!

0
1
0
[RSS] Windows Exploitation Tricks: Trapping Virtual Memory Access (2025 Update)

https://googleprojectzero.blogspot.com/2025/01/windows-exploitation-tricks-trapping.html
0
0
1
repeated

Cheers to 11 years of AppSec Ezine! 🎉 Huge thanks to the security community for sharing and the supporters who made this journey possible. Here's to another year of knowledge-sharing! 🚀

572nd Edition: https://pathonproject.com/zb/?871f09331bbd8d13#6ahftCLH0VYSLjlk8M+FtRW8EibTcKL+J5qO7xUUPpk=

Repo: https://github.com/Simpsonpt/AppSecEzine

1
4
0
repeated

The second blog is about an interesting bug class in COM servers that implement IDispatch, which allows you to potentially create other objects in the process. For example every OOP COM server with IDispatch allows you to create a STDFONT object which isn’t really designed to be safely used cross process. To demo its usefulness I then use the trick to get code injection in a Windows-PPL process from where you could open protected LSASS etc. https://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.html

2
7
1
repeated

CVE-2025-21325 - 2025-Jan - ARM64 - Windows Secure Kernel Mode Elevation of Privilege

full diff 👀 https://gist.github.com/clearbluejar/318abe5d072eef55b9ea7c23a591726e

Incorrect permission assignment? 🧐 https://gist.github.com/clearbluejar/318abe5d072eef55b9ea7c23a591726e#skmicommitpte-diff

0
3
0
Show older