腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android AntiVM - Android虚拟机检测库,意在未授权的情况下禁止在虚拟机App上非法运行: https://github.com/bunnyblue/AntiVM
-
[ Android ] LG Android 的 ASFParser ASFParser::ParseHeaderExtensionObjects memcpy 时缺少边界检查,触发越界读: https://bugs.chromium.org/p/project-zero/issues/detail?id=1222
-
[ Attack ] 精确测量电量消耗侧信道还原加密 Key 之前都要求物理接触设备,来自 Fox-IT 的这项研究利用专用设备和天线,可以在 1 米范围内发起侧信道攻击: https://www.fox-it.com/nl/wp-content/uploads/sites/12/Tempest_attacks_against_AES.pdf
-
[ Browser ] WebKit: JSC: heap buffer overflow in Intl.getCanonicalLocales(CVE-2017-6984): https://bugs.chromium.org/p/project-zero/issues/detail?id=1229
-
[ Network ] DNS typosquatting 实现水坑攻击: https://blog.0day.rocks/practical-waterholing-through-dns-typosquatting-e252e6a2f99e
-
[ Popular Software ] Adobe Flassh ATF Parser 中存在堆破坏(CVE-2017-3078): https://bugs.chromium.org/p/project-zero/issues/detail?id=1216
-
[ Popular Software ] Adobe Flash avc edge 处理时存在越界读取漏洞(CVE-2017-3076): https://bugs.chromium.org/p/project-zero/issues/detail?id=1212
-
[ Vulnerability ] InsideSecure MatrixSSL 在解析 X509 certificate 时存在整数溢出,进一步可导致信息泄露(CVE-2017-2782): https://talosintelligence.com/vulnerability_reports/TALOS-2017-0278
-
[ Windows ] GhostHook - 利用基于 Processor Trace 的 Hooking 技术绕过 PatchGuard : https://www.cyberark.com/threat-research-blog/ghosthook-bypassing-patchguard-processor-trace-based-hooking/
-
[ Windows ] MsMpEng: mpengine x86 Emulator Heap Corruption in VFS API: https://bugs.chromium.org/p/project-zero/issues/detail?id=1282
-
[ Windows ] 以DoublePulsar Shellcode 为例讲解如何使用 Windbg 加载并调试 Windows 内核 Shellcodes: https://vallejo.cc/2017/06/23/loading-and-debugging-windows-kernel-shellcodes-with-windbg-debugging-doublepulsar-shellcode/
-
[ Windows ] Project Zero 最近公开了很多 mjurczyk 发现的 Windows 内核的漏洞: https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=label%3AFinder-mjurczyk+Vendor%3AMicrosoft+id%3E1000&sort=-modified&colspec=ID+Type+Status+Priority+Milestone+Owner+Summary+Modified&cells=ids