腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Industry News ] 趋势科技发现 ProMediads 开始使用 Sundown-Pirate 漏洞利用工具包进行勒索软件传播等恶意活动: http://blog.trendmicro.com/trendlabs-security-intelligence/promediads-malvertising-sundown-pirate-exploit-kit/
-
[ iOS ] Apple 发布 iOS 10.3.3 安全更新: https://support.apple.com/en-us/HT207923
-
[ Linux ] Azeria Labs 对进程内存布局和常见内存破坏类型的总结: https://azeria-labs.com/process-memory-and-memory-corruption/
-
[ macOS ] Apple 发布 macOS Sierra 10.12.6 安全更新,修复多个漏洞: https://support.apple.com/en-us/HT207922
-
[ OpenSourceProject ] Apache Struts 远程代码执行漏洞分析(CVE-2017-9791): https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-cve-2017-9791-apache-struts-vulnerability-can-lead-remote-code-execution/
-
[ Others ] 搭建一个 Fake AP 接入点的教程: https://rootsh3ll.com/ultimate-fake-access-point-walkthrough/
-
[ Popular Software ] 福昕阅读器解析 PDF 时存在越界读取导致信息泄露漏洞:(CVE-2017-10943): http://payatu.com/foxit-reader-pdf-parsing-bounds-read-information-disclosure-vulnerability-4/ (CVE-2017-10944): http://payatu.com/foxit-reader-pdf-parsing-bounds-read-information-disclosure-vulnerability-5/
-
[ Popular Software ] Oracle E-Business Suite 可在未认证的情况下下载任意文档(CVE-2017-10244): https://threatpost.com/oracle-e-business-suite-flaw-allows-downloads-of-documents/126897/
-
[ Tools ] quincy - 内存取证工具,从内存转储中检测代码注入攻击: https://github.com/tbarabosch/quincy
-
[ Vulnerability ] NXP i.MX 微处理器安全启动特性的两个漏洞分析,来自 QuarksLab: https://blog.quarkslab.com/vulnerabilities-in-high-assurance-boot-of-nxp-imx-microprocessors.html
-
[ Vulnerability ] GNOME Thumbnailer 存在一个 VBScript 脚本注入的漏洞: http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html
-
[ Windows ] 通过劫持 COM Server 以绕过 AMSI 防御: https://posts.specterops.io/bypassing-amsi-via-com-server-hijacking-b8a3354d1aff
-
[ Windows ] Brandis - Web 版的端到端加密应用: https://github.com/brandis-project/brandis
-
[ Windows ] Use msxsl to bypass AppLocker,来自 3gstudent's blog: https://3gstudent.github.io/3gstudent.github.io/Use-msxsl-to-bypass-AppLocker/
-
[ Windows ] CVE-2017-8464 LNK漏洞分析及POC关键部分,来自 启明星辰 ADLab:http://mp.weixin.qq.com/s/j4liqjofnJk4eBRu1dG3dQ