Journal
November, 2018
VirtualBox 0day
One of the most lucid breaks I’ve seen in a while https://github.com/MorteNoir1/virtualbox_e1000_0day
2018-10
libssh causes massive freakout
https://arstechnica.com/information-technology/2018/10/bug-in-libssh-makes-it-amazingly-easy-for-hackers-to-gain-root-access/ https://www.libssh.org/security/advisories/CVE-2018-10933.txt
September, 2018
Alpine APK
https://justi.cz/security/2018/09/13/alpine-apk-rce.html
August 2018
Another Struts RCE
https://semmle.com/news/apache-struts-CVE-2018-11776
RANSOM
Routing Around Nation-States: Overlays and Measurements https://ransom.cs.princeton.edu/
OpenSSH user oracle
http://www.openwall.com/lists/oss-security/2018/08/15/5 http://www.openwall.com/lists/oss-security/2018/08/24/1
Intel L1 bug
https://www.theregister.co.uk/2018/08/14/intel_l1_terminal_fault_bugs/ https://lwn.net/Articles/762570/
July 2018
NetSpectre
https://misc0110.net/web/files/netspectre.pdf
Bluetooth broken again
https://www.kb.cert.org/vuls/id/304725
More Spectre defenses
https://arxiv.org/abs/1807.05843
June 2018
Microsoft buys GitHub
https://johansen.software/github-xp/
Simon and Speck
https://www.spinics.net/lists/linux-crypto/msg33291.html
May 2018
Throwhammer
I wonder how long before Rowhammer-style attacks make their way to networking equipment… https://www.cs.vu.nl/~herbertb/download/papers/throwhammer_atc18.pdf
EFail
A broken embargo, and lots of finger pointing. Security is awesome! https://efail.de/
Nethammer
https://arxiv.org/pdf/1805.04956.pdf
April 2018
patch runs ed
http://rachelbythebay.com/w/2018/04/05/bangpatch/
Xz format inadequate for long-term archiving
(from the lzip format author) https://www.nongnu.org/lzip/xz_inadequate.html
This of course is sad because we software developers are among the few people who are able to understand the strengths and weaknesses of formats. We have a moral duty to choose wisely the formats we use because everybody else will blindly use whatever formats we choose.
March 2018
Exim pre-auth RCE
https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
Juggling with packets
As such, the Internet has a non-zero momentary data storage capacity.
It is possible to push out a piece of information and effectively have
it stored until echoed back. By establishing a mechanism for cyclic
transmission and reception of chunks of data to and from a number of
remote hosts, it is possible to maintain an arbitrary amount of data
constantly `on the wire', thus establishing a high-capacity volatile
medium.
http://lcamtuf.coredump.cx/juggling_with_packets.txt
Temporal Return Addresses (2005)
Paper (PDF) An exploitation chronomancer is one who is capable of divining the best time to exploit something based on the alignment of certain bytes that occur naturally in a process’ address space
Abusing Certificate Transparency logs
https://github.com/UnaPibaGeek/ctfr
February 2018
Audio Adversarial Examples
Because the computer is always right. Only a matter of time before there’s malware hidden in the next pop hit. https://nicholas.carlini.com/code/audio_adversarial_examples/
30-year-old OpenVMS local root vuln
https://www.theregister.co.uk/AMP/2018/02/06/openvms_vulnerability/
Meltdown/Spectre (continued)
http://www.brendangregg.com/blog/2018-02-09/kpti-kaiser-meltdown-performance.html https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/ Spectre Mitigations in Microsoft’s C/C++ Compiler Intel Analysis of Speculative-Exectutation Side Channels (PDF) AMD Indirect Branch Control Extension (PDF)
December 2018
Meltdown/Spectre
Throw out all your computers. Again.
Intel CPU Design Flaw Meltdown and Spectre attack Reading privileged memory with a side-channel AMD processors unaffected Apple deals with KPTI with DoubleMap As expected, Intel’s CEO dumps his stock Retpoline Theo De Raadttalking about Intel flaws back in 2007
IOHIDeous
This is the tale of a macOS-only vulnerability in IOHIDFamily that yields kernel r/w and can be exploited by any unprivileged user.
https://siguza.github.io/IOHIDeous/
MSPaint in your browser
December 2017
Advent calendar season
Avast open-sources their decompiler
https://blog.avast.com/avast-open-sources-its-machine-code-decompiler
ROBOT Attack
It has been X many days since last TLS disaster https://robotattack.org/
Microsoft Quantum Development Kit
https://www.microsoft.com/en-us/quantum/development-kit Writing a Quantum Program
AP Christmas Tree
https://imgur.com/gallery/DZRTr
BrickerBot update
Dude destroys tons of equipment, points out internet is broken. http://archive.is/PQAnU
Amazingly, the ISP didn’t try to cover up the outage as some kind of network issue, power spike or a bad firmware upgrade. They didn’t lie to their customers at all. Instead, they promptly published a press release about their modems having been vulnerable which allowed their customers to assess their potential risk exposure. What did the most honest ISP in the world get for its laudable transparency? Sadly it got little more than criticism and bad press. It’s still the most depressing case of ‘why we can’t have nice things’ to me, and probably the main reason for why 99% of security mistakes get covered up and the actual victims get left in the dark. Too often ‘responsible disclosure’ simply becomes a euphemism for ‘coverup.’
Send Crypto People Tulips
Like shorting the market, but funnier https://sendcryptopeopletulips.com/
November 2017
Fooling Neural Networks/Machine Learning
https://arxiv.org/abs/1708.05207 http://www.labsix.org/physical-objects-that-fool-neural-nets/ https://cvdazzle.com/ http://dismagazine.com/dystopia/evolved-lifestyles/8115/anti-surveillance-how-to-hide-from-machines/
So… MINIX is everywhere
Turns out there’s a lot of garbage hidden on CPU’s these days. Work is underway to defang the nastiness https://www.networkworld.com/article/3236064/servers/minix-the-most-popular-os-in-the-world-thanks-to-intel.html https://schd.ws/hosted_files/osseu17/84/Replace%20UEFI%20with%20Linux.pdf
Code exec from VMWare guest
VMware Workstation and Fusion contain a heap buffer-overflow vulnerability in VMNAT device. This issue may allow a guest to execute code on the host.
https://www.vmware.com/ca/security/advisories/VMSA-2017-0018.html
Intel ME is unsurprisingly vulnerable
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
Linus Rant du Jour
If it's been on a random cellphone for a few months, and real users
used it, and had facebook and candy crush running on it, that's a
pretty different deal.
https://lkml.org/lkml/2017/11/21/356 http://lkml.iu.edu/hypermail/linux/kernel/1711.2/01701.html
instant root on macOS High Sierra
I honestly have no words for how dumb this is.
http://www.theregister.co.uk/2017/11/28/root_access_bypass_macos_high_sierra/
fix: sudo passwd -u root dsenableroot -d
October 2017
CommonMark
It turns out having 20+ Markdown implementations with no spec is a bad idea. Let’s see how long before there’s a competing spec ;-) http://commonmark.org/
dnsmasq RCEs
Wouldn’t it be nice if we stopped writing critical system services in C? Nah. https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
Google teapot
Macro-less code exec in MS Word
https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/
A2 Analog Attack
An older one, but a great read. https://www.wired.com/2016/06/demonically-clever-backdoor-hides-inside-computer-chip/
The Pathologies of Big Data
http://queue.acm.org/detail.cfm?id=1563874
“In designing applications to handle ever-increasing amounts of data, developers would do well to remember that hardware specs are improving too, and keep in mind the so-called ZOI (zero-one-infinity) rule, which states that a program should “allow none of foo, one of foo, or any number of foo.” That is, limits should not be arbitrary; ideally, one should be able to do as much with software as the hardware platform allows.”
“… big data should be defined at any point in time as “data whose size forces us to look beyond the tried-and-true methods that are prevalent at that time.”
KRACK Attack
WPA2 is broken, hum-de-dum https://www.krackattacks.com/ https://github.com/vanhoefm/krackattacks
September 2017
BlueBorne attack
https://arstechnica.com/information-technology/2017/09/bluetooth-bugs-open-billions-of-devices-to-attacks-no-clicking-required/ http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf
It turns out most Bluetooth stacks are terrible.
Design of Display Processors
https://twitter.com/rob_pike/status/907164275965255685 http://cva.stanford.edu/classes/cs99s/papers/myer-sutherland-design-of-display-processors.pdf
Distrusting Symantec Certs
https://security.googleblog.com/2017/09/chromes-plan-to-distrust-symantec.html
ABI Compliance Checker
http://ispras.linuxbase.org/index.php/ABI_compliance_checker
Sandsifter
Black Hat presentation https://github.com/xoreaxeaxeax/sandsifter
Root Causes of Chrome Certificate Errors
https://research.google.com/pubs/pub46359.html
To our surprise, we find that more than half of errors are caused by client-side or network issues instead of server misconfigurations.
CLKSCREW
https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/tang
More Intel ME 0wnage
Fake packages in PyPI
http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/
Optionsbleed
CVE-2017-9798 https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
FIN7 Group Uses JavaScript and Stealer DLL Variant in New Attacks
http://blog.talosintelligence.com/2017/09/fin7-stealer.html What makes this one interesting is the obfuscation techniques
The function body of the evaluated JavaScript appears to be within a multi-line comment, however, in reality this is evaluated as a multi-line string.
Linux PIE/stack corruption (CVE-2017-1000253)
https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt