腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android 应用安全检查清单: https://github.com/b-mueller/android_app_security_checklist/blob/master/README.md
-
[ Browser ] Microsoft IE: CMarkup::DestroySplayTree 方法存在内存破坏漏洞(CVE-2017-8594): https://bugs.chromium.org/p/project-zero/issues/detail?id=1233
-
[ Browser ] Microsoft IE VBScript arithmetic functions 中的存在类型混淆漏洞: https://bugs.chromium.org/p/project-zero/issues/detail?id=1237
-
[ Fuzzing ] 从 fuzzing Apache httpd server 到获得 1500刀奖励: https://animal0day.blogspot.co.uk/2017/07/from-fuzzing-apache-httpd-server-to-cve.html
-
[ Linux ] Alpine Linux 漏洞利用(Pt 2 of 2): https://www.twistlock.com/2017/07/13/alpine-linux-pt-2-twistlock-security-alert/
-
[ MalwareAnalysis ] 分析 WMI 持久化后门 - WMIGhost / Wimmie: https://secrary.com/ReversingMalware/WMIGhost/
-
[ MalwareAnalysis ] 趋势科技对 Android 后门 - GhostCtrl 的分析报告,该后门可以悄悄的记录受害者的声音、视频以及更多敏感信息: http://blog.trendmicro.com/trendlabs-security-intelligence/android-backdoor-ghostctrl-can-silently-record-your-audio-video-and-more/
-
[ Operating System ] 去年下半年 Talos 团队公开了 Memcached 的多个漏洞,Talos 昨天发了一篇 Blog 介绍互联网上 Memcached 服务器对这些漏洞的修复情况: http://blog.talosintelligence.com/2017/07/memcached-patch-failure.html#more
-
[ Others ] ARM exploitation for IoT – Episode 1,作者打算写个 ARM 平台的漏洞利用系列文章,涵盖 ARM 平台的逆向、Shellcode 编写和利用技巧,今天是第一篇 逆向篇: https://quequero.org/2017/07/arm-exploitation-iot-episode-1/
-
[ Others ] FreeRADIUS 发布更新,修复了多个漏洞,其中部分由 Guido Vranken 写的定制 libFuzzer 发现: https://threatpost.com/freeradius-update-patches-bugs-static-analysis-tools-missed/126872/
-
[ Popular Software ] Cisco Webex 再次被发现存在远程代码执行漏洞: https://bugs.chromium.org/p/project-zero/issues/detail?id=1324 官方公告: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex
-
[ Tools ] ReverseAPK - 快速逆向分析安卓应用的 Bash 脚本: https://github.com/1N3/ReverseAPK… https://t.co/lREDx1NBPT
-
[ Tools ] SynesthesiaYS - Rolf Rolles 开源的一款 Shellcode 生成器: http://www.msreverseengineering.com/blog/2017/7/15/the-synesthesia-shellcode-generator-code-release-and-future-directions Github: https://github.com/RolfRolles/SynesthesiaYS
-
[ Tools ] AttifyOS - 针对 IoT 设备进行渗透测试的系统: https://github.com/adi0x90/attifyos
-
[ Tools ] XSStrike - Fuzz XSS 漏洞的工具,可以自动发现并绕过常见 WAF: https://github.com/UltimateHackers/XSStrike
-
[ Virtualization ] 两周前推送了一篇长亭科技的 VMware 拖拽和粘贴实现中的堆溢出漏洞,是由于包长度检查不完善引起的,成功利用这个漏洞可以实现虚拟机逃逸。McAfee 昨天发了一篇 Blog 分析官方修复这个漏洞的补丁: https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-patch-of-a-virtual-machine-escape-on-vmware/
-
[ Windows ] Windows 内核 nsiproxy/netio 池在处理 IOCTL 0x120007 (NsiGetParameter) 时存在内存泄露(CVE-2017-8564): https://bugs.chromium.org/p/project-zero/issues/detail?id=1238
-
[ Windows ] "Bypassing" Microsoft's Patch for CVE-2017-0199,来自 Haifei Li。CVE-2017-0199 漏洞位于 HTA Scriptlet File Handler 中,之前被用于野外的鱼叉式钓鱼攻击中: http://justhaifei1.blogspot.com/2017/07/bypassing-microsofts-cve-2017-0199-patch.html
-
[ MalwareAnalysis ] 从 DNS 和 sinkhole 视角看 WannaCry 蠕虫,来自 360 网络安全实验室: http://blog.netlab.360.com/wannacry-from-dns-and-sinkhole-view/
-
[ MalwareAnalysis ] “双枪”狙击:首例连环感染MBR和VBR的顽固木马分析,来自 FreeBuf: http://www.freebuf.com/articles/web/140113.html
-
[ Vulnerability ] Old .NET Vulnerability #4: Double Construction Verification Issue (CVE-2013-0004) - IL(integrity level) verifier 的 Bug 引起对象构造函数重入最终导致 TOCTOU 攻击,来自 James Forshaw: https://tyranidslair.blogspot.com/2017/07/old-net-vulnerability-4-double.html