
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Chrome 62 版本修复的 UXSS with MHTML(CVE-2017-5124)漏洞的分析和 PoC,分析部分是俄语: https://bo0om.ru/chrome-and-safari-uxss https://github.com/Bo0oM/CVE-2017-5124/
-
[ Browser ] Firefox 57 版本发布,开始启用全新的 Quantum 引擎,号称在速度上有巨大提升。本次更新也修复了若干漏洞: https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/
-
[ Industry News ] Adobe 修复了 Flash Player、Reader 和 Acrobat 等软件中共 56 个漏洞: https://threatpost.com/adobe-patches-flash-player-56-bugs-in-reader-and-acrobat/128876/
-
-
[ Linux ] Linux 版 Firefox 57 在沙箱防护上做了一些改进: http://www.morbo.org/2017/11/linux-sandboxing-improvements-in.html
-
[ Malware ] Paloalto 对 MuddyWater 团伙攻击中东地区的调查报告: https://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/
-
[ MalwareAnalysis ] 针对最新 POS 机恶意软件 Trojan.Win32.Alinaos 的分析: https://www.pandasecurity.com/mediacenter/pandalabs/alina-pos-malware/
-
[ Mobile ] 一加(OnePlus)多款手机预装的开发者模式(EngineerMode)APP 被怀疑是一个 ROOT 权限的后门: https://www.nowsecure.com/blog/2017/11/14/oneplus-device-root-exploit-backdoor-engineermode-app-diagnostics-mode/ ; 一加官方对此称,EngineerMode 是个官方遗留的诊断工具,接下来将通过 OTA 升级删除。: https://threatpost.com/debugging-tool-left-on-oneplus-phones-enables-root-access/128881/
-
[ Popular Software ] 微软今天修复的 Office EQNEDT32.EXE 内存破坏漏洞分析(CVE-2017-11882): https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about
-
[ Rootkit ] rootkit - 针对 Ubuntu 16.04 和 10.04 的 rootkit: https://github.com/nurupo/rootkit
-
[ SecurityReport ] 卡巴斯基发布 2017 年第三季度 APT 趋势报告: https://securelist.com/apt-trends-report-q3-2017/83162/
-
[ Tools ] x86-assembly-cheat - x86 汇编语言实现的多个用户态和系统级的组件源码收集,包括 ELF、linking、interrupt 等等: https://github.com/cirosantilli/x86-bare-metal-examples https://github.com/cirosantilli/x86-assembly-cheat
-
-
[ Vulnerability ] Xplico 未授权远程代码执行漏洞详情披露(CVE-2017-16666): https://pentest.blog/advisory-xplico-unauthenticated-remote-code-execution-cve-2017-16666/
-
[ Vulnerability ] WordPress 插件 Formidable Forms 多处漏洞详情披露: https://klikki.fi/adv/formidable.html
-
[ Web Security ] 如何部署 CSP、Hashes、Nonces 和 Report URI,充分保护自己的网站: https://www.troyhunt.com/locking-down-your-website-scripts-with-csp-hashes-nonces-and-report-uri/
-
[ Windows ] Windows 17035 版本启用了 ASLR/VA 隔离,类似 Linux KAISER: https://twitter.com/aionescu/status/930412525111296000
-
[ Browser ] Edge 浏览器 CVE-2017-11845 内存破坏漏洞疑似 PoC: https://twitter.com/w3bd3vil/status/930500317065527296
-
[ Browser ] Firefox - settings cookie via DOMParser: http://insert-script.blogspot.com/2017/11/firefox-settings-cookie-via-domparser.html
-
-
[ iOS ] Apple iOS Host Pairing Bypass(CVE-2017-13806): https://labs.mwrinfosecurity.com/advisories/apple-ios-host-pairing-bypass/
-
-
[ Mobile ] Google Pixel 2 中的锁屏硬件保护模块介绍: https://security.googleblog.com/2017/11/lock-it-up-new-hardware-protections-for.html
-
-
-
[ SecurityAdvisory ] 微软发布 2017 年 11 月安全公告: https://portal.msrc.microsoft.com/en-us/security-guidance http://blog.talosintelligence.com/2017/11/ms-tuesday.html
-
[ SecurityProduct ] McAfee LiveSafe MiTM 注册表 修改导致远程执行命令漏洞( CVE-2017-3898): https://blogs.securiteam.com/index.php/archives/3522
-
[ Tools ] HAXM - Intel 基于虚拟化技术(VT)实现的硬件辅助虚拟化引擎开源了,之前 HAXM 被用于为 Android 模拟器加速: https://github.com/intel/haxm
-
-
[ Vulnerability ] 思科UCS平台模拟器远程代(CVE-2017-12243): https://blogs.securiteam.com/index.php/archives/3525