
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] Kaspersky 发布 2018 Q2 季度 APT 趋势报告: https://securelist.com/apt-trends-report-q2-2018/86487/
-
[ Browser ] Chrome 网络缓存层的 Blockfile媒体缓存UaF、内存缓存 UaF漏洞(CVE-2018-6085、CVE-2018-6086): https://twitter.com/i/web/status/1016695139555631104
-
[ Hardware ] Intel CPU TLBleed 超线程漏洞技术细节放出 : https://www.vusec.net/projects/tlbleed/Paper : https://www.vusec.net/wp-content/uploads/2018/07/tlbleed-author-preprint.pdf
-
[ Hardware ] Speculative Buffer Overflows: Attacks and Defenses (paper): https://people.csail.mit.edu/vlk/spectre11.pdf
-
[ iOS ] iOS 11.3-11.4 完全反编译 rootfs 的重挂载: https://github.com/jakeajames/Reverse-Engineering/blob/master/electra1131/electra.m
-
[ iOS ] iOS 表情符号拒绝服务漏洞详情披露(CVE-2018-4290): https://objective-see.com/blog/blog_0x34.html
-
[ MalwareAnalysis ] Arch Linux AUR 包仓库中发现恶意软件: https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/
-
[ MalwareAnalysis ] 通过机器学习检测恶意 PowerShell,来自 Fireeye: https://www.fireeye.com/blog/threat-research/2018/07/malicious-powershell-detection-via-machine-learning.html
-
[ OpenSourceProject ] libxpc 内存越界读取漏洞详情披露(CVE-2018-4248): http://bazad.github.io/2018/07/xpc-string-leak/
-
[ Others ] 漏洞挖掘技巧分享:连接多个漏洞获取管理员访问权限: https://nahamsec.com/chaining-multiple-vulnerabilities-to-gain-admin-access/
-
[ Pentest ] 针对活动目录集成 DNS 服务的攻击方法介绍: https://blog.netspi.com/exploiting-adidns/
-
[ Pentest ] 利用对活动目录 Domain NC Head 的写权限提升活动目录访问权限: https://sdmsoftware.com/group-policy-blog/security-policy/elevating-ad-domain-access-with-write-access-on-the-domain-nc-head/
-
[ Popular Software ] VLC 媒体播放器 2.2.8 任意代码执行漏洞 PoC(CVE-2018-11529): http://seclists.org/fulldisclosure/2018/Jul/28
-
[ Popular Software ] 多个 Adobe Acrobat DC 远程代码执行漏洞披露(CVE-2018-12812、CVE-2018-12756、CVE-2018-12815): https://blog.talosintelligence.com/2018/07/vuln-spotlight-adobe-reader.html
-
[ Popular Software ] WebLogic RMI 反序列化远程代码执行漏洞 EXP(CVE-2017-3248): https://www.exploit-db.com/exploits/44998/
-
[ SecurityAdvisory ] Microsoft 发布 2018 年 7 月安全公告: https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments 7月安全更新: https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/1c26eff2-573f-e811-a96f-000d3a33c573
-
[ SecurityAdvisory ] Adobe 2018 年 7 月安全公告: https://helpx.adobe.com/security.html
-
[ SecurityReport ] ZDI 对 7 月安全更新的回顾: https://www.zerodayinitiative.com/blog/2018/7/10/the-july-2018-security-update-review
-
[ Vulnerability ] 多个 Antenna House Office Server Document Converter 的漏洞披露(CVE-2018-3929、CVE-2018-3930、CVE-2018-3931、CVE-2018-3932、CVE-2018-3933、CVE-2018-3936、): https://blog.talosintelligence.com/2018/07/vuln-spotlight-antenna.html
-
[ Vulnerability ] .NET Core 安全功能绕过漏洞详情披露(CVE-2018-8356): https://github.com/dotnet/announcements/issues/73
-
[ Web Security ] CSP 绕过技巧: https://lab.wallarm.com/how-to-trick-csp-in-letting-you-run-whatever-you-want-73cb5ff428aa