每日安全动态推送(08-14)

admin 腾讯玄武实验室 2019-08-14


Tencent Security Xuanwu Lab Daily News


• [Vulnerability] Comodo Antivirus - Sandbox Race Condition Use-After-Free (CVE-2019-14694): 
http://rce4fun.blogspot.com/2019/08/comodo-antivirus-sandbox-race-condition.html

   ・ Comodo Antivirus 反病毒软件的沙盒 UAF 漏洞的分析 (CVE-2019-14694) – Jett


• Attacking SSL VPN - Part 2: Breaking the Fortigate SSL VPN: 
https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html?m=1

   ・ 多款 SSL VPN 的漏洞及利用技巧,今年blackhat和defcon上也有分享,值得学习 – Danny__Wei

   ・ Orange大佬的议题,思路和研究方向很值得学习。 – whip1ash


• [Wireless] [PDF] https://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air-wp.pdf: 
https://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air-wp.pdf

   ・ 腾讯安全Blade Team在blackhat usa 2019 上关于利用WiFi漏洞RCE的细节公开了。 – freener0


• [Tools] nccgroup/fuzzowski: 
https://github.com/nccgroup/fuzzowski

   ・ nccgroup团队基于Sulley构造的一个对网络协议进行模糊测试的工具。 – M1s5p


• [Windows, Firmware, Vulnerability, Hardware] [PDF] https://eclypsium.com/wp-content/uploads/2019/08/DEFCON-27-Get-off-the-kernel-if-you-cant-drive.pdf: 
https://eclypsium.com/wp-content/uploads/2019/08/DEFCON-27-Get-off-the-kernel-if-you-cant-drive.pdf

   ・ 利用有漏洞的驱动程序实现花式提权:作者基于特征搜索以及基于 Angr 的自动化搜索发现了大量有漏洞的驱动程序,受影响的主要是各种硬件 / 固件厂商 – Ke Liu


• [Wireless] [PDF] https://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air.pdf: 
https://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air.pdf

   ・ 腾讯安全Blade Team在blackhat usa 2019 上关于利用WiFi漏洞RCE的细节公开了 – freener0


• [Windows, Vulnerability] August 2019 Security Updates: 
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/312890cc-3673-e911-a991-000d3a33a34d

   ・ 微软发布 8 月份 Windows 漏洞补丁更新 – Jett


• [Linux] Thread Sanitizer for Swift on Linux: 
https://swift.org/blog/tsan-support-on-linux/

   ・ Swift 5.1 在 Linux 开始支持 Thread Sanitizer,用于解决 Swift 多线程中的数据访问条件竞争问题 –Jett


• [Exploit] smealum/butthax: 
https://github.com/smealum/butthax

   ・ 爱感(LOVENSE)Hush 情趣用品的漏洞利用代码 – Jett


• [PDF] https://i.blackhat.com/USA-19/Thursday/us-19-Lilang-Debug-For-Bug-Crack-And-Hack-Apple-Core-By-Itself-Fun-And-Profit-To-Debug-And-Fuzz-Apple-Kernel-By-LLDB-Script.pdf: 
https://i.blackhat.com/USA-19/Thursday/us-19-Lilang-Debug-For-Bug-Crack-And-Hack-Apple-Core-By-Itself-Fun-And-Profit-To-Debug-And-Fuzz-Apple-Kernel-By-LLDB-Script.pdf

   ・ 使用苹果自带的LLDB Script fuzz macOS系统内核 – R3dF09


• [Linux] Case study: Searching for a vulnerability pattern in the Linux kernel: 
https://a13xp0p0v.github.io/2019/08/10/cfu.html

   ・ 针对一个发现的内核漏洞,利用Semmel QL及Coccinelle搜寻类似漏洞。 – M1s5p


* 查看或搜索历史推送内容请访问: 
https://sec.today

* 新浪微博账号: 腾讯玄武实验室 
https://weibo.com/xuanwulab

    已同步到看一看

    发送中

    本站仅按申请收录文章,版权归原作者所有
    如若侵权,请联系本站删除
    觉得不错,分享给更多人看到
    腾讯玄武实验室 热门文章:

    BadTunnel:跨网段劫持广播协议    阅读/点赞 : 3386/54

    安全动态推送春节合辑(上)    阅读/点赞 : 449/5

    每日安全动态推送(02-21)    阅读/点赞 : 392/4

    每日安全动态推送(03-13)    阅读/点赞 : 390/6

    每日安全动态推送(09-19)    阅读/点赞 : 380/4

    每日安全动态推送(10-11)    阅读/点赞 : 378/4

    每日安全动态推送(06-20)    阅读/点赞 : 368/6

    每日安全动态推送(10-19)    阅读/点赞 : 344/4

    每日安全动态推送(11-25)    阅读/点赞 : 331/4

    每日安全动态推送(07-18)    阅读/点赞 : 320/4

    腾讯玄武实验室 微信二维码

    腾讯玄武实验室 微信二维码