腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] 蝴蝶效应与程序错误 - 一个渣洞的利用之旅(CVE-2016-9651),介绍了 Gong Guang 如何利用 V8 对象私有属性的逻辑漏洞(利用对象赋值)->越界读(unescape)->越界写(堆风水)->任意地址读写(改写 JITted Code Buffer)->任意代码执行的过程,整个过程非常巧妙: https://github.com/secmob/pwnfest2016
-
[ Browser ] Safari 技术预览版 33 的 Release Notes: https://webkit.org/blog/7751/safari-technology-preview-33/
-
[ Browser ] IE Localhost 沙箱逃逸的漏洞(CVE-2017-0226),从 PM 到穿透 EPM: http://thomas-vanhoutte.blogspot.be/2017/06/making-zdi-localhost-escape-work-from.html
-
[ Browser ] Edge 浏览器 SparseArraySegment 内存破坏漏洞(CVE-2017-0138)的细节与 PoC: http://www.security-assessment.com/files/documents/advisory/sparsearraysegment.pdf IE 浏览器 "TryGetProperty" 内存破坏漏洞(CVE-2017-0049)的细节与 PoC: http://www.security-assessment.com/files/documents/advisory/trygetproperty.pdf IE 浏览器 "ToPrimitive" 内存破坏漏洞(CVE-2017-0130)的细节与 PoC: http://www.security-assessment.com/files/documents/advisory/toprimitive.pdf IE 浏览器 "ReverseSegment" 内存破坏漏洞(CVE-2017-0040)的细节与 PoC: http://www.security-assessment.com/files/documents/advisory/reversesegment.pdf Edge 浏览器 comparestring 信息泄露漏洞的细节与 PoC(CVE-2017-0009): http://www.security-assessment.com/files/documents/advisory/comparestring_infoleak.pdf
-
[ Challenges ] CTF Fusion – Level05 题的解题答案: http://arielkoren.com/blog/2017/06/14/fusion-level05-solution/
-
[ Industry News ] App Store 的搜索广告功能被发现用于诈骗: https://threatpost.com/abuse-of-apple-search-ads-feature-leading-to-fraud/126265/
-
[ Industry News ] WANNACRY 勒索事件之后的今天,仍有 550 万的设备暴露着 SMB 端口: https://threatpost.com/post-wannacry-5-5-million-devices-still-expose-smb-port/126249/
-
[ Linux ] 有研究者公开了一个前两周的 Linux Sudo get_process_ttyname()(CVE-2017-1000367) 漏洞的 Exploit: http://seclists.org/oss-sec/2017/q2/470 https://github.com/c0d3z3r0/sudo-CVE-2017-1000367
-
[ Others ] HP 打印机从只有一个 CVE-2017-2741 编号的漏洞公告到发现漏洞并实现远程代码执行: https://www.tenable.com/blog/rooting-a-printer-from-security-bulletin-to-remote-code-execution
-
[ Others ] 通过跟踪事件日志检测内网横向渗透: https://t.co/J9yjlW1FPO
-
[ Pentest ] 扫描活动目录权限与特权账户: https://adsecurity.org/?p=3658
-
[ Popular Software ] IDA Pro debug server RCE 漏洞的 Metasploit 利用模块,影响 Linux & Windows 平台的 IDA 6.6/6.8/6.9: https://github.com/rapid7/metasploit-framework/pull/8474
-
[ Popular Software ] Adobe Flash Player SecureSocket UAF 远程代码执行漏洞POC: https://lnkd.in/eqw_Mnj
-
[ Popular Software ] 大数据内容管理中常用的 Lexmark Perceptive Document Filters 软件的漏洞的利用: http://blog.talosintelligence.com/2017/06/lexmark-perceptive-vuln-deep-dive.html
-
[ Tools ] Armory Sandbox - 基于 USB armory 打造一个用于分析 USB 设备是否内嵌恶意软件的 USB analyzer: https://sentinelone.com/blogs/armory-sandbox-building-usb-analyzer-usb-armory/
-
[ Tools ] IDA ARM 指令解码与高亮的插件: https://github.com/gdelugre/ida-arm-system-highlight
-
[ Tools ] 经过 v6.95 后漫长的沉寂,IDA Pro 正在全面迁移至 64 位版本,IDA v7 中也将支持 PowerPC 64-bit 的反编译: http://www.hexblog.com/?p=1096
-
[ Tools ] Kaspersky 发布 Jeff Ransomware 的解密工具: https://t.co/k97avyqSj6
-
[ Tools ] Nmap 7.50 发布,包含 14 新的 NSE 脚本、300+ 指纹、新的 Npcap 等: http://seclists.org/nmap-announce/2017/3
-
[ Tools ] user.js - Firefox 配置安全加固脚本: https://github.com/pyllyukko/user.js
-
[ Vulnerability ] Windows Server 2008/2012/2016 WINS 的一个远程内存破坏漏洞,微软不打算修复这个漏洞,而是推荐用户从 WINS 切换至 DNS: https://blog.fortinet.com/2017/06/14/wins-server-remote-memory-corruption-vulnerability-in-microsoft-windows-server
-
[ Windows ] Windows 10 code integrity policies 部署指南: https://github.com/Microsoft/windows-itpro-docs/blob/master/windows/device-security/device-guard/deploy-code-integrity-policies-steps.md
-
[ Windows ] HackSysExtreme 驱动任意地址写漏洞的利用: https://osandamalith.com/2017/06/14/windows-kernel-exploitation-arbitrary-overwrite/
-
-
-
[ Popular Software ] Metasploit 刚刚修复了一个漏洞,结束任务的功能缺乏对 CSRF 的防护,攻击者可以直接请求结束任务,影响多个版本(CVE-2017-5244): https://community.rapid7.com/community/metasploit/blog/2017/06/14/r7-2017-16-cve-2017-5244-lack-of-csrf-protection-for-stopping-tasks-in-metasploit-pro-express-and-community-editions-fixed
-
-