每日安全动态推送(05-14)

admin 腾讯玄武实验室 2019-05-14
Tencent Security Xuanwu Lab Daily News


• [Hardware] [PDF] https://firmwaresecurity.files.wordpress.com/2019/05/lfnw2019-bmc.pdf: 
https://firmwaresecurity.files.wordpress.com/2019/05/lfnw2019-bmc.pdf

   ・ 针对带外管理 BMC 攻击的防御 – Jett


• [IoT] RouterOS SMB RCE CVE-2018-7554 Analysis: 
https://tttang.com/archive/9/

   ・ MikroTik RouterOS 路由器操作系统 SMB 服务 CVE-2018-7554 RCE 漏洞的复现利用 – Jett


• [Tools] 1120362990/vulnerability-list: 
https://github.com/1120362990/vulnerability-list

   ・ 常见漏洞快速检测的工具,支持对 Tomcat、Fckeditor、Weblogic、Redis 等组件的多个漏洞进行检测 – Jett


• [Vulnerability] Beware of the Magic SpEL(L) - Part 2 (CVE-2018-1260): 
https://www.gosecure.net/blog/2018/05/17/beware-of-the-magic-spell-part-2-cve-2018-1260

   ・ Spring Framework Security OAuth2 RCE 漏洞的分析(CVE-2018-1260),来自 GoSecure 团队 – Jett


• [Attack, Report] [PDF] https://www.ukfinance.org.uk/system/files/Fraud%20The%20Facts%202019%20-%20FINAL%20ONLINE.pdf: 
https://www.ukfinance.org.uk/system/files/Fraud%20The%20Facts%202019%20-%20FINAL%20ONLINE.pdf

   ・ UK Finance 发布面向金融和银行业的支付行业欺诈威胁研究报告 – Jett


• [Android, Vulnerability, iOS] CVE-2019-3568: 
https://www.facebook.com/security/advisories/cve-2019-3568

   ・ WhatsApp 客户端在处理 VOIP 数据包时存在缓冲区溢出漏洞(CVE-2019-3568) – Jett


• [Android] An Analysis of Pre-installed Android Software: 
https://arxiv.org/abs/1905.02713

   ・ Android 供应链中厂商预装软件对安全生态的影响(Paper) – Jett


• [PDF] https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Pwning%20HDMI%20for%20Fun%20and%20Profit%20-%20Jeonghoon%20Shin%20&%20Changhyeon%20Moon.pdf: 
https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Pwning%20HDMI%20for%20Fun%20and%20Profit%20-%20Jeonghoon%20Shin%20&%20Changhyeon%20Moon.pdf

   ・ HDMI 协议以及如何写一个 Fuzzer 测试其协议实现代码 – Jett


• [iOS, macOS] [PDF] https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Fresh%20Apples%20-%20Researching%20New%20Attack%20Interfaces%20on%20iOS%20and%20OSX%20-%20Moony%20Li%20&%20Lilang%20Wu.pdf: 
https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Fresh%20Apples%20-%20Researching%20New%20Attack%20Interfaces%20on%20iOS%20and%20OSX%20-%20Moony%20Li%20&%20Lilang%20Wu.pdf

   ・ iOS/macOS 系统内核、内核扩展新攻击接口的自动化发现和 Fuzzing 测试 – Jett


• [Tools, Web] opensec-cn/vtest: 
https://github.com/opensec-cn/vtest

   ・ 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞 – Jett


• [IoT, Vulnerability] Vulnerability Spotlight: Multiple vulnerabilities in the Roav A1 Dashcam: 
http://feedproxy.google.com/~r/feedburner/Talos/~3/Viua7FSt2G4/vulnerability-spotlight-multiple.html

   ・ Roav A1 Dashcam 摄像头被发现多个漏洞,来自 Talos 团队 – Jett


• [macOS, iOS] [PDF] https://conference.hitb.org/hitbsecconf2019ams/materials/D1T1%20-%20MBUF-OFLOW%20-%20Finding%20Vulnerabilities%20in%20iOS%20MacOS%20Networking%20Code%20-%20Kevin%20Backhouse.pdf: 
https://conference.hitb.org/hitbsecconf2019ams/materials/D1T1%20-%20MBUF-OFLOW%20-%20Finding%20Vulnerabilities%20in%20iOS%20MacOS%20Networking%20Code%20-%20Kevin%20Backhouse.pdf

   ・ mbuf overflow - 在 iOS/macOS 系统的网络组件中找漏洞 – Jett


• [macOS] [PDF] https://conference.hitb.org/hitbsecconf2019ams/materials/D2T2%20-%20ModJack%20-%20Hijacking%20the%20MacOS%20Kernel%20-%20Zhi%20Zhou.pdf: 
https://conference.hitb.org/hitbsecconf2019ams/materials/D2T2%20-%20ModJack%20-%20Hijacking%20the%20MacOS%20Kernel%20-%20Zhi%20Zhou.pdf

   ・ ModJack - 绕过内核加载扩展的安全防护,劫持内核。来自蚂蚁金服研究员 CodeColorist  – Jett


• [Vulnerability] Beware of the Magic SpEL(L) - Part 1 (CVE-2018-1273): 
https://www.gosecure.net/blog/2018/05/15/beware-of-the-magic-spell-part-1-cve-2018-1273

   ・ Spring Framework SpEL 注入漏洞的分析(CVE-2018-1273),来自 GoSecure 团队 – Jett


• [Wireless] [PDF] https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Bypassing%20GSMA%20Recommendations%20on%20SS7%20Networks%20-%20Kirill%20Puzankov.pdf: 
https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Bypassing%20GSMA%20Recommendations%20on%20SS7%20Networks%20-%20Kirill%20Puzankov.pdf

   ・ Hidden Agendas: bypassing GSMA recommendations on SS7 networks,来自 Positive Technologies 研究员对 SS7 七号信令网络攻击的总结 – Jett


* 查看或搜索历史推送内容请访问: 
https://sec.today

* 新浪微博账号: 腾讯玄武实验室 
https://weibo.com/xuanwulab


    阅读原文
    已同步到看一看

    发送中

    本站仅按申请收录文章,版权归原作者所有
    如若侵权,请联系本站删除
    觉得不错,分享给更多人看到
    腾讯玄武实验室 热门文章:

    BadTunnel:跨网段劫持广播协议    阅读/点赞 : 3386/54

    安全动态推送春节合辑(上)    阅读/点赞 : 449/5

    每日安全动态推送(02-21)    阅读/点赞 : 392/4

    每日安全动态推送(03-13)    阅读/点赞 : 390/6

    每日安全动态推送(09-19)    阅读/点赞 : 380/4

    每日安全动态推送(10-11)    阅读/点赞 : 378/4

    每日安全动态推送(06-20)    阅读/点赞 : 368/6

    每日安全动态推送(10-19)    阅读/点赞 : 344/4

    每日安全动态推送(11-25)    阅读/点赞 : 331/4

    每日安全动态推送(07-18)    阅读/点赞 : 320/4

    腾讯玄武实验室 微信二维码

    腾讯玄武实验室 微信二维码