Posts
2498
Following
575
Followers
1284
A drunken debugger

Heretek of Silent Signal
repeated
repeated

Unpatched and Exploited Zero-Days: Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX
Two different sets of researchers reported vulnerabilities in I-O DATA routers to JPCERT/CC.

  • CVE-2024-45841 (6.5 medium) Incorrect Permission Assignment for Critical Resource
  • CVE-2024-47133 (7.2 high) OS Command Injection
  • CVE-2024-52564 (7.5 high) Inclusion of Undocumented Features

The developer states that attacks exploiting these vulnerabilities have been observed.

The developer states that the updates addressing these vulnerabilities (CVE-2024-45841, CVE-2024-47133) are planned to be released around December 18, 2024. Too early to speculate and no additional information provided.

cc: @cR0w @mttaggart @ntkramer @dreadpir8robots @neurovagrant @goatyell @metacurity (remember to remove the mentions to avoid ReplyAll madness)

0
2
0
repeated

Rust 1.83.0 has been released! πŸ¦€βœ¨

This release includes mutable references and pointers in const, references to statics in const, new `ErrorKind`s, and many new const methods on pointers, slices, floats, and more!

Check out the announcement: https://blog.rust-lang.org/2024/11/28/Rust-1.83.0.html

0
5
0
repeated
repeated

I haven't even had my first cup of coffee and we have another ../ CVE. This time it's Synology: https://nvd.nist.gov/vuln/detail/CVE-2024-11398

3
3
0
[RSS] The Great Google Password Heist: 15 years of hacking passwords to test our security (and build team culture!)

https://bughunters.google.com/blog/6355265783201792/the-great-google-password-heist-15-years-of-hacking-passwords-to-test-our-security-and-build-team-culture
0
2
2
repeated

Exactly 11 (!) years ago we released an advisory for an rsync 0-day.

Two days earlier the Gentoo Linux mirror I was hosting and maintainig was compromised with it.

What a ride.

https://forums.gentoo.org/viewtopic.php?t=111779

https://lists.samba.org/archive/rsync-announce/2003/000011.html

0
6
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡Ί

Maybe fun to know - using means that the US government has bulk access to your data, which matters if you are a government yourself. Supporters of Microsoft will tell you you can easily use "double key encryption" to protect your MS365 data against US government snooping. This is how easily you can do that. Hint, it involves GitHub and compiling code: https://learn.microsoft.com/en-us/purview/double-key-encryption-setup

6
8
0
repeated

My VirusBulletin presentation: A web of surveillance was uploaded to YouTube: https://www.youtube.com/watch?v=iERGg1dUVNE

0
3
0
You are holding your Internet wrong.
1
2
2
[RSS] Your Bluesky Posts Are Probably In A Bunch of Datasets Now

https://www.404media.co/bluesky-posts-machine-learning-ai-datasets-hugging-face/

Surprise: you%27ve published them on the Internet.
0
0
2
[RSS] Vodka maker Stoli says August ransomware attack contributed to bankruptcy filing

https://therecord.media/stoli-group-usa-bankruptcy-filing-ransomware

Bastards!
0
0
0
[RSS] Tricks from product support: We're not smart enough to debug the problem, can you help us?

https://devblogs.microsoft.com/oldnewthing/20241203-00/?p=110601

"It looks like the anti-malware software is interfering with our ability to debug the problem." :)
0
1
0
repeated

New whitepaper and exploit code from @stephenfewer on 5 new vulnerabilities he chained to achieve unauthenticated RCE on Lorex 2K Indoor Wi-Fi security cameras. The exploit works in two phases and comprises an auth bypass, a stack-based buffer overflow, an out-of-bounds heap read, and a null pointer dereference β€” and that's just to start (because it was, like, Tuesday for Stephen or whatever) πŸ“ˆ

Whitepaper: https://www.rapid7.com/globalassets/_pdfs/research/pwn2own-iot-2024-lorex-2k-indoor-wi-fi-security-camera-research.pdf

Exploit: https://github.com/sfewer-r7/LorexExploit

0
5
0
repeated

Interestingly enough, MS disabled the "Use my Windows user account" checkbox when connecting to Wi-Fi on the lock screen to address CVE-2024-38143 in the August Patch Tuesday.

This change completely remediates the "Airstrike" attack as well. 🀯

https://support.microsoft.com/en-us/topic/august-13-2024-kb5041585-os-builds-22621-4037-and-22631-4037-76655cde-e2ee-49d4-a415-cf9a4d3c3a04

0
2
0
Details of the commitee hearing about the VBÜ hack were classified for 29 years.

I guess I have to change my lifestyle a bit if I want to know the details...

(or hack some gov DB, which I would never ever do ofc!)
0
0
1
repeated
repeated
repeated

The V Programming Language

The Advent of Code for V has started, uncovering a new challenge every day! Check them out!

https://github.com/vlang/adventofcode

0
3
0
Show older