40th Weekly Vuln Research newsletter is OUT NOW 📰
iOS kernel exploitation from @alfiecg_dev
Elgato hacking from @dt_db
@_tsuro bypasses CET
RCU Internals from @u1f383
Google Teams check off their OKRs
➕ Jobs and more 👇
We had a short look at the buffer overflow found by fuzzing `process_browse_data` to determine its exploitability. Conclusion: this bug alone won't give you RCE, or even an info leak.
Here's my quick and dirty PoC for the CUPS vulns. I wrote it after spotting the patches in the public CUPS repo. As always, expect CTF-quality code :D
Finally I got myself to write a script to generate documentation for #Ghidra - now I host the latest info about 11.2, including but not limited to:
I took this opportunity to redo the directory structure that broke most search engine links, sorry about that (this will improve with time ofc)!
Normal authors: release book to the public early in the week, with much fanfare.
Me, late Friday afternoon, from a dark alley: "psst! Hey, you! Yeah, you! #sysadmin! Buddy! You ever wanted to Run Your Own Mail Server?" #ryoms
https://www.tiltedwindmillpress.com/product/ryoms-ebook/
(boosts appreciated! )
“It’s the time of Orwell but with corporations." https://www.wired.com/story/internet-archive-memory-wayback-machine-lawsuits/
This is a must-read on the existential battle of @internetarchive
If you wanna take action after, we've got a list of things to do at https://www.battleforlibraries.com/
I can FINALLY announce the news! I have been awarded a British Academy small grant!!
This work will be on safeguarding knowledge about floppy disks! The project will include working with @dpc_chat @JennyMitcham @anj on gathering floppy disk information in one place. But will also include interviewing floppy disk experts across communities and cleaning floppy disks with different techniques with the conservation department at the Cambridge University Library!!
Finished the #FSWA training by @stevenseeley and found something cooler than calc.exe to pop: The almost 30 years old dialer.exe. And yes, it's on PATH
In March 2019, I broke a story about how Facebook had been storing unencrypted password data for hundreds of millions of Facebook users.
Today, the lead European Union privacy regulator fined Meta ~$100 million for that security/privacy failure, which Facebook said could have allowed any one of its 200,000 employees to see the plaintext passwords for up to 600M accounts.
“Do we need to worry about cups?”
“No we’ve got a handle on it”
OpenPrinting/CUPS project decided to publish my related-but-different finding (in code that is about to all go away) https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq86-c7g6-r2h8
Some soft skills insight I gathered over my long career as a security researcher and shitposter:
Thanks for following my Ted speech
#Ghidra 11.2 released
Documentation links with HTML preview (generated links point to raw repo contents):
https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_11.2_build