Posts
2525
Following
647
Followers
1460
"I'm interested in all kinds of astronomy."
repeated
Edited 10 months ago

Happy Patch Tuesday from Microsoft: 87 vulnerabilities, 7 zero-days (6 exploited)

  • CVE-2024-38189 (8.8 high) Microsoft Project Remote Code Execution Vulnerability (exploited)
  • CVE-2024-38107 (7.8 high) Windows Power Dependency Coordinator Elevation of Privilege Vulnerability (exploited)
  • CVE-2024-38106 (7.0 high) Windows Kernel Elevation of Privilege Vulnerability (exploited)
  • CVE-2024-38213 (6.5 medium) Windows Mark of the Web Security Feature Bypass Vulnerability (exploited)
  • CVE-2024-38193 (7.8 high) Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability (exploited)
  • CVE-2024-38178 (7.5 high) Scripting Engine Memory Corruption Vulnerability (exploited)
  • CVE-2024-38199 (9.8 critical) Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability (publicly disclosed)

cc: @campuscodi @briankrebs @mttaggart @deepthoughts10 @cR0w @regnil @bschwifty @arinc629 @Cali @wvu @hrbrmstr @avoidthehack @bieberium @TheDustinChilds @dreadpir8robots (make sure to remove all the mentions to avoid ReplyAll madness)

4
6
0
repeated

Fortinet security advisories for :

  • FG-IR-22-445 CVE-2022-45862 (3.7 low) GUI Console WebSockets do not terminate on logout
  • FG-IR-24-012 CVE-2024-36505 (5.1 medium) Real-time file system integrity checking write protection bypass
  • FG-IR-22-047 CVE-2022-27486(6.7 medium) OS command injections in execute CLI commands
  • FG-IR-24-255 RADIUS Protocol CVE-2024-3596 (Fortinet gives it a 6.5 medium) aka
  • FG-IR-23-467 CVE-2024-21757 (6.1 medium) Priviledged admin able to modify super-admins password
  • FG-IR-23-088 CVE-2023-26211 (6.8 medium) XSS vulnerability in communications triggered in playbooks

No mention of exploitation. CVE-2024-3596 was publicly disclosed 09 July 2024.

0
1
0
[FD] Microsoft PlayReady WMRMECC256 Key / root key issue (attack #5)

https://seclists.org/fulldisclosure/2024/Aug/15
0
0
0
repeated

Politico, the NYT, the WaPo, and others say they received hacked Trump campaign materials, but gave few details, a marked contrast to Clinton's emails in 2016 (David Bauder/Associated Press)

https://apnews.com/article/trump-vance-leak-media-wikileaks-e30bdccbdd4abc9506735408cdc9bf7b
http://www.techmeme.com/240813/p14#a240813p14

0
1
0
repeated
repeated

Zoho ManageEngine security advisories:

No mention of exploitation. Mitre and NVD only have publish dates from yesterday 12 August 2024, even though the Zoho advisories marked them fixed 14 June 2024. Zoho also doesn't indicate when the advisories were published. Happy

0
1
0
repeated

‼️Big day! NIST publishes standards for next-generation cryptography (cipher, digital signature) understood as resistant to attacks with future quantum computers. Migration will not be a piece of cake, but there’s time. https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf

1
1
0
repeated

Seeking help from an IT security person - please share!

I run an open source, federated event sharing site, (https://gath.io). A few days ago, it was victim to a ransomware attack that deleted the database. I need a few hours of someone's time (paid of course!) to sit with me and go through my security configuration ASAP.

Sometimes, running open source, free, community services _sucks_. blobhaj_sadreach

7
11
0
[RSS] It rather involved being on the other side of the airtight hatchway: Disabling a security feature as an administrator

https://devblogs.microsoft.com/oldnewthing/20240806-00/?p=110103
1
0
1
[RSS] Pwn2Own Automotive 2024: Hacking the ChargePoint Home Flex (and their cloud...)

https://sector7.computest.nl/post/2024-08-pwn2own-automotive-chargepoint-home-flex/
0
3
1
[RSS] BSidesLV 2024 Slides - Modern ColdFusion Exploitation and Attack Surface Reduction

https://www.hoyahaxa.com/2024/08/bsideslv-2024-slides-modern-coldfusion.html
0
1
2
[RSS] You Can’t Spell WebRTC without RCE - Part 3

https://margin.re/2024/08/you-cant-spell-webrtc-without-rce-part-3/
0
4
3
repeated

fun Linux fact:

There are at least two places in the Linux kernel where performance-sensitive code paths use a, uh, retrospective approach to memory safety, where you do the memory read first (and suppress the occasional kernel page fault) and worry about making sure it was memory-safe later.

One of the two is in the SLUB allocator's lockless allocation fastpath: https://elixir.bootlin.com/linux/v6.10.4/source/mm/slub.c#L544
It (1) first loads the pointer to the current top freelist element, then (2) reads the next freelist pointer out of that element, and (3) does a double-wide atomic compare-exchange to check if it raced and replace the freelist head. The read in step (2) can return garbage or fault if someone else concurrently modified the freelist (basically it can be UAF), but in that case step (3) that uses the result of the read is guaranteed to fail, so it's fine.

The other one is in the Virtual File System layer, used for printing pathnames (like for getcwd()):
https://elixir.bootlin.com/linux/v6.10.4/source/fs/d_path.c#L50
As the comment there explains:

 * The source of the prepend data can be an optimistic load
* of a dentry name and length. And because we don't hold any
* locks, the length and the pointer to the name may not be
* in sync if a concurrent rename happens, and the kernel
* copy might fault as a result.
*
* The end result will correct itself when we check the
* rename sequence count, but we need to be able to handle
* the fault gracefully.

So this one can race so that OOB memory is copied into the path buffer, but the kernel will afterwards notice that the "how many rename operations have happened" counter has gone up (or that the "we are currently in the middle of a rename" bit is set), discard the result, and try again.

2
4
0
repeated

Resorts World (one of the hotels defcon contracted with to offer rooms to con attendees) decided to pull some clown shit and announce they’re doing daily room checks for “hacking” as some knee-jerk response to the MGM ransom attack last year. Someone leaked the checklist they gave to employees and it’s even dumber than you thought.

14
7
0
repeated
repeated

Wireless hacking doesn't have to be a mess of dongles and ad-hoc code anymore.

Yesterday @virtualabs from Quarkslab and @rcayre from EURECOM released WHAD, a set of open source tools, libraries and firmware to make wireless security research easier.

WHAD implements 6 protocols (BLE, ZigBee, RF4CE, Unifying, ESB, LoRaWAN) and supports 11 different hardware devices, including 4 embedding our custom firmwares to extend their capabilities.

It can be used to sniff various protocols (BLE, 802.15.4, ZigBee, RF4CE, Enhanced Shockburst, Logitech Unifying and even unknown ones via its PHY support), packet injection, MITM attacks, device emulation, device sharing over TCP, and a number of other features and capabilities.

See the code repository here https://github.com/whad-team/whad-client

1
6
0
Show older