腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Firefox Structured clone 算法在处理 shared array buffers 时存在引用计数泄露,这篇 Blog 介绍 saelo 利用这个漏洞实现在 Linux Firefox Beta 53 版本的任意代码执行: https://phoenhex.re/2017-06-21/firefox-structuredclone-refleak
-
[ Bug Bounty ] 微软准备无限期延长 Edge 浏览器的 Bug Bounty 项目: https://threatpost.com/microsoft-extends-edge-bug-bounty-program-indefinitely/126446/
-
[ Linux ] SCONE: Secure Linux Containers with Intel SGX,Intel SGX 保护机制在 Linux 容器上的应用: https://www.usenix.org/system/files/conference/osdi16/osdi16-arnautov.pdf
-
[ MachineLearning ] 机器学习及其在网络安全方面的应用,来自 NCC Group: https://www.nccgroup.trust/uk/our-research/rise-of-the-machines-machine-learning-and-its-cyber-security-applications/
-
[ Others ] 内存的回收管理(GC)一直是某些安全语言低效的重要原因,来自微软的这篇研究 Paper 尝试让用户在安全语言中自己管理内存: https://www.microsoft.com/en-us/research/publication/simple-fast-safe-manual-memory-management/
-
[ Popular Software ] 用于快速搭建 Web 程序的 Webpack & Preact-CLI 在处理证书时存在问题: https://medium.com/@mikenorth/webpack-preact-cli-vulnerability-961572624c54
-
[ SecurityProduct ] AV-Test 对 18 款杀毒软件在 Windows 10 系统中的评测,从安全防护能力、性能、可用性三个维度: https://www.av-test.org/en/news/news-single-view/test-18-security-suites-under-windows-10/
-
[ SecurityProduct ] Bitdefender 杀软处理畸形 RAR 文件时 Crash: https://bugs.chromium.org/p/project-zero/issues/detail?id=1278&desc=6
-
[ Symbolic Execution ] FireEye 对远程符号解析技术的分析与解决方案: https://www.fireeye.com/blog/threat-research/2017/06/remote-symbol-resolution.html
-
[ Tools ] Serpico - 渗透测试报告生成与协作工具: https://github.com/SerpicoProject/Serpico
-
[ Tools ] remote_lookup - FireEye 开源了一个工具,用于从远程正在运行的进程解析 API 地址的符号信息,然后更新 IDA 的汇编指令符号信息: https://www.fireeye.com/blog/threat-research/2017/06/remote-symbol-resolution.html https://github.com/fireeye/remote_lookup
-
-
[ Vulnerability ] 研究员通过 Fuzz 的方法发现了 OpenVPN 项目的多个远程漏洞: https://guidovranken.wordpress.com/2017/06/21/the-openvpn-post-audit-bug-bonanza/
-
[ Web Security ] 使用 Python 检测与绕过 Web 应用防火墙的教程: http://www.kalitutorials.net/2016/12/python-detect-and-bypass-web-application-firewall.html
-
[ Windows ] 微软 MSRC 的研究员根据 Twitter 上的一张 Crash 截图还原了漏洞、构造 PoC 的故事: https://blogs.technet.microsoft.com/srd/2017/06/20/tales-from-the-msrc-from-pixels-to-poc/
-
[ Windows ] Windows 内核栈内存信息泄露漏洞(DeviceApi (PiDqIrpQueryGetResult, PiDqIrpQueryCreate, PiDqQueryCompletePendedIrp))(CVE-2017-8474): https://bugs.chromium.org/p/project-zero/issues/detail?id=1183
-
[ Windows ] Windows 10 S 默认阻止网络下载文档中的宏代码运行: https://support.office.com/en-us/article/Block-suspicious-macros-in-Office-on-Windows-10-S-60785abc-d8b8-4b80-8f5d-67ddbee213e9
-
[ Pentest ] Hunt Or Be Hunted,来自 BSides London 会议的演讲,关于入侵与入侵检测: https://www.slideshare.net/AlexDavies49/bsides-london-2017-hunt-or-be-hunted