每日安全动态推送(9-13)
2024-9-13 16:35:53 Author: mp.weixin.qq.com(查看原文) 阅读量:0 收藏

Tencent Security Xuanwu Lab Daily News

• Finding Cross-References:
https://www.nowsecure.com/blog/2024/09/12/reversing-ios-system-libraries-using-radare2-a-deep-dive-into-dyld-cache-part-2/

   ・ 介绍了使用Radare2逆向工程iOS系统库的方法,重点讨论了如何使用radare2工具进行反向工程分析。 – WireFish

• Critical Vulnerabilities in Kakadu JPEG 2000 Library Expose Systems to Remote Attacks:
https://securityonline.info/critical-vulnerabilities-in-kakadu-jpeg-2000-library-expose-systems-to-remote-attacks/

   ・ 揭示了Google Chrome Vulnerability Rewards (CVR)团队在Kakadu图像库中发现的关键漏洞,讨论了新的攻击技术“条件性损坏”,以及对常见保护方法的绕过。 – WireFish

• ThinkCMF框架任意内容包含漏洞的讲解:
https://sectoday.tencent.com/api/article/Ypun6ZEBMw8bedWYxoSM/link

   ・ 这篇文章深入剖析了ThinkCMF中的一个严重安全漏洞,详细解释了攻击者如何利用URL构造来实现远程代码执行,以及展示了具体的漏洞利用方式和修复建议。这是对网络安全领域的重要贡献。 – WireFish

• Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey:
https://r.sec-consult.com/msi

   ・ 讨论了针对MSI安装程序的不同攻击,并介绍了一种名为“msiscan”的开源分析工具,以自动检测潜在的安全问题。 – WireFish

• Diving into ADB protocol internals (1/2):
https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-12

   ・ 介绍了ADB协议的内部工作原理以及一种名为adb_client的Rust crate,该crate可用于与ADB协议进行交互。 – WireFish

• Breach in Tesla Model 3's TPMS Unveils Serious Security Flaw:
https://cybellum.com/blog/breach-in-tesla-model-3-tpms-unveils-serious-security-flaw/

   ・ 特斯拉Model 3的TPMS漏洞被揭示,通过无线通信执行远程代码 – WireFish

• AlcaWASM Challenge Writeup - Pwning an In-Browser Lua Interpreter:
https://deda.lol/posts/2024-09-12-escape_alcawasm/

   ・ 介绍了 Lua 解释器中的新漏洞,包括详细的漏洞分析和利用技术,以及用于利用漏洞的 exploit 代码,是一篇与 Lua 解释器有关的安全技术文章。 – WireFish

• Exploiting Exchange PowerShell After ProxyNotShell: Part 2 - ApprovedApplicationCollection:
https://www.zerodayinitiative.com/blog/2024/9/11/exploiting-exchange-powershell-after-proxynotshell-part-2-approvedapplicationcollection

   ・ 该文章详细分析了Microsoft Exchange中的新漏洞CVE-2023-36756和ZDI-CAN-21499,并提供了相应的漏洞利用方法。作者在OffensiveCon 2024会议上分享了这些成果. – WireFish

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号: 腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959793&idx=1&sn=377b4fa14fe40b567c3316185c612c5b&chksm=8baed16ebcd958786c6b2ae484162c40bfe3e183246a215b93fb4a79835c6a6d0fe6936e4772&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh