Wow Intel SGX and Sub-Page Protection exploded at the same time yesterday. The latter is so broken Intel removes it from all future processors. 👀
Remove /dev/null from a host and a surprising number of programs crash and burn. Experienced sysadmins understand that most software requires an uninterruptible supply of nothing.
Full Rapid7 analysis and #exploit PoC (with root shell!) for #FortiManager #CVE202447575 via @stephenfewer 🐚 Not a simple project, as it turned out :) https://attackerkb.com/topics/OFBGprmpIE/cve-2024-47575/rapid7-analysis
The Pentium processor had a minor error in the division algorithm. This error cost Intel $475 million to replace the faulty chips. I've tracked down the FDIV error to this circuit on the die:
Me to Matomo:
Your installation instructions guarantee that Windows will be vulnerable to LPE. You should probably fix that.
Matomo:
"Unfortunately we do not consider this as a security issue, because it's actually fully unrelated to Matomo itself."
Great job, folks!
Clownstrike @ 358...
Cyber incidents appear to have no long term impact ;-)
We have observed D-Link NAS CVE-2024-10914 /cgi-bin/account_mgr.cgi command injection exploitation attempts starting Nov 12th. This vuln affects EOL/EOS devices, which should be removed from the Internet: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10413
We see ~1100 exposed.
We share IP data on exposed D-Link NAS instances for your network/constituency in our Device ID reports (vendor D-Link, type: nas): https://shadowserver.org/what-we-do/network-reporting/device-identification-report/
D-Link NAS exposure tracker https://dashboard.shadowserver.org/statistics/iot-devices/time-series/?date_range=7&vendor=d-link&type=nas&model=sharecenter&dataset=count&limit=1000&group_by=geo&style=stacked
Happy #PatchTuesday on a Wednesday from Palo Alto Networks:
"Palo Alto Networks is not aware of any malicious exploitation of this issue." RE:CVE-2024-9472: "However, customers have reported encountering this issue during normal operations."
Another big step towards becoming a security boundary: today we’re expanding the VRP for the V8 Sandbox
* No longer limited to d8
* Rewards for controlled writes are increased to $20k
* Any memory corruption outside the sandbox is now in scope
See https://bughunters.google.com/about/rules/chrome-friends/5745167867576320/chrome-vulnerability-reward-program-rules#v8-sandbox-bypass-rewards for more details.
Happy hacking!
Thrilled to share my BlueHat keynote is now live! 🎤
"A Clash of Cultures Comes Together to Change Software" dives into how early hacker groups like the L0pht began collaborating with tech companies, reshaping software security.
Watch here: https://www.youtube.com/watch?v=w6SAqT4ZQik
bsky.app/profile/b1ack0wl.bsky.social/post/3latq4vftsk2a
Heads up: that viral "backdoor attempt" against multiple GitHub repos is a smear campaign. The lame code that was submitted is also a part of it since it's there to paint a picture of someone with very little offensive skills. Don't fall for the bait
GitLab security advisory: GitLab Patch Release: 17.5.2, 17.4.4, 17.3.7
No mention of exploitation.
#GitLab #PatchTuesday #CVE #vulnerability #infosec #cybersecurity
A lot of people think Apple Silicon Macs can boot from external storage, and Apple themselves go to great lengths to pretend they can.
However, the iBoot bootloader does not have USB or Thunderbolt drivers at all, and absolutely cannot boot from external storage in any way, shape, or form.
But they're cheating.
When you "select" an external volume to "boot" from, whether from macOS or recoveryOS or the Boot Picker (which is just recoveryOS, which is just macOS), the fully booted OS with full access to external storage will copy the bootloader, firmware, and OS kernel to internal storage, then configure the machine to boot off of THAT. Then the bootloader is still just booting off of internal storage.
You can see this if you set up "external" boot, then try to power on the machine without the disk connected. The progress bar will appear below the Apple logo, and that progress bar is drawn by the macOS kernel, which proves macOS is already running, even though supposedly you removed the disk it's booting from. It only times out and fails a few seconds later when it can't find the external disk to mount the root filesystem from.
BTW, the only blocker for supporting the same exact mechanism for USB boot in Asahi Linux is that m1n1 does not have USB drivers either, which it needs to chain off stage 2 from USB. So if anyone wants to help out and write a bare-metal xHCI USB stack with enough support for hubs and mass storage devices in Rust... ;-)