What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
2021-08-10 09:21:33 Vulnerability Spotlight: Code execution vulnerability in Mozilla Firefox (lien direct) Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered a use-after-free vulnerability in Mozilla Firefox that could lead to code execution.  Firefox is a widely used web browser available on many operating systems. This... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability Guideline
2021-08-04 07:18:22 Vulnerability Spotlight: Use-after-free vulnerability in tinyobjloader (lien direct) Lilith >_> of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a use-after-free vulnerability in a specific function of tinyobjloader. An adversary could trick a user into opening a specially crafted file, causing a use-after-free condition, and... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-07-15 07:28:34 Vulnerability Spotlight: Multiple vulnerabilities in Advantech R-SeeNet (lien direct) The Talos vulnerability research team discovered these vulnerabilities. Blog by Jon Munshaw.  Cisco Talos recently discovered multiple vulnerabilities in the Advantech R-SeeNet monitoring software.  R-SeeNet is the software system used for monitoring Advantech routers. It continuously... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-07-08 13:25:03 PrintNightmare: Here\'s what you need to know and Talos\' coverage (lien direct) Over the past several weeks, there's been a lot of discussion about a particular privilege escalation vulnerability in Windows affecting the print spooler, dubbed PrintNightmare. The vulnerability (CVE-2021-1675/CVE-2021-34527) has now been patched multiple times but is believed to still be... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-07-02 07:04:52 Talos Takes Ep. #59: How to secure the devices that secure your home network (lien direct) By Jon Munshaw. As consumers start having more “smart” devices connected to their home network, they may want an easy solution to keeping those devices safe. But what if that device gets owned? Carl Hurd of our vulnerability research team recently discovered several vulnerabilities in Trend Micro's... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-06-28 08:05:00 Vulnerability Spotlight: Memory corruption vulnerability in PowerISO\'s DMG handler (lien direct) Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered a memory corruption vulnerability in PowerISO's handler that deals with DMG files.  PowerISO is a CD/DVD/BD image file processing tool, which allows users to open, extract,... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-06-16 12:51:51 Vulnerability Spotlight: EIP Stack Group OpENer information disclosure vulnerability (lien direct) Martin Zeiser of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered an exploitable information disclosure vulnerability in EIP Stack Group OpENer's Ethernet/IP UDP handler.   OpENer is an Ethernet/IP stack for I/O adapter devices that... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-06-08 13:19:32 Vulnerability Spotlight: Code execution vulnerability in Google Web Audio API (lien direct) Piotr Bania of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered two use-after-free vulnerabilities in Google's Web Audio API that an adversary could exploit to execute remote code on the victim machine. Web Audio API is a high-level JavaScript API... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-06-02 14:19:39 (Déjà vu) Vulnerability Spotlight: Use-after-free vulnerability in WebKit (lien direct) Marcin Towalski of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. The WebKit browser engine contains a use-after-free vulnerability in its GraphicsContext function. A malicious web page code could trigger a use-after-free error, which could lead to can lead to a potential... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability Guideline
2021-05-20 10:41:46 Vulnerability Spotlight: Heap-based buffer overflow in Google Chrome could lead to code execution (lien direct) Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered an exploitable heap-based buffer overflow vulnerability in Google Chrome.   Google Chrome is a cross-platform web browser - and Chromium is the open-source... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-05-19 11:54:59 Vulnerability Spotlight: Information disclosure vulnerability in macOS SMB server (lien direct) Aleksandar Nikolic of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered an exploitable integer overflow vulnerability in Apple macOS' SMB server that could lead to information disclosure.   Server Message Block (SMB) is a network... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability Guideline
2021-05-14 05:26:39 Talos Takes Ep. #53: The broader lesson of those air fryer vulnerabilities (lien direct) By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit the Talos Takes page. It seemed like everyone on security Twitter had a joke when we disclosed a vulnerability in a WiFi-connected air fryer.... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-05-11 12:00:51 (Déjà vu) Vulnerability Spotlight: Code execution vulnerability in Adobe Acrobat Reader (lien direct) Aleksandar Nikolic of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered an arbitrary code execution vulnerability in Adobe Acrobat Reader.   Adobe Acrobat Reader is one of the most popular and feature-rich PDF readers on the market.... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-05-06 08:12:55 Vulnerability Spotlight: Use-after-free vulnerability in Foxit PDF Reader (lien direct) Aleksandar Nikolic of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered a use-after-free vulnerability in the Foxit PDF Reader.   Foxit PDF Reader is one of the most popular PDF document readers currently available. As a complete... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-04-27 07:17:28 Vulnerability Spotlight: Information disclosure vulnerability in the Linux Kernel (lien direct) Lilith >_> and Claudio Bozzato of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered an information disclosure vulnerability in the Linux Kernel.   The Linux Kernel is the free and open-source core of Unix-like operating systems.... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-04-22 07:01:05 Threat Advisory: Pulse Secure Connect Coverage (lien direct) Pulse Secure announced that a critical vulnerability (CVE-2021-22893) was discovered in their VPN service "Pulse Secure Connect" in a recent security advisory. The advisory states that, "a vulnerability was discovered under Pulse Connect Secure (PCS). This includes an authentication by-pass... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-03-10 07:14:49 Vulnerability Spotlight: Use-after-free vulnerability in 3MF Consortium lib3mf (lien direct) Lilith >_> of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. 3MF Consortium's lib3mf library is vulnerable to a use-after-free vulnerability that could allow an adversary to execute remote code on the victim machine. The lib3mf library is an open-source implementation of the 3MF file format and standard, mainly used for 3D-printing. An attacker could send a target a specially crafted file to create a use-after-free condition. The 3MF standard has been adopted in a... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-03-03 06:59:15 (Déjà vu) Vulnerability Spotlight: Remote code execution vulnerability in WebKit WebAudio API (lien direct) Marcin “Icewall” Noga of Cisco Talos discovered these vulnerabilities. Blog by Jon MunshawExecutive summary The WebKit browser engine contains a remote code execution vulnerability in its WebAudio API interface. A malicious web page code could trigger a use-after-free error, which could lead to arbitrary code execution. An attacker could exploit this vulnerability by tricking the user into visiting a specially crafted, malicious web page and performing a guest-to-host escape through Hyper-V... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability Guideline
2021-03-03 06:50:51 Vulnerability Spotlight: Password reset vulnerability in Epignosis eFront (lien direct) A Cisco Talos researcher discovered this vulnerability. Blog by Jon Munshaw. Epignosis eFront contains a vulnerability that could allow an adversary to reset the password of any account of their choosing. eFront is a learning management system platform that allows users to create training courses, post courses and more. An attacker could exploit this vulnerability by predicting a password reset seed to generate the correct password reset for a one-time token.  In accordance with our... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-03-03 06:38:00 Vulnerability Spotlight: Memory corruption vulnerability in Accusoft ImageGear (lien direct) Emmanuel Tacheau discovered this vulnerability. Blog by Jon Munshaw. Accusoft ImageGear contains a vulnerability that could allow an attacker to corrupt the software's memory, potentially allowing them to execute arbitrary code on the victim machine. The ImageGear library is a document-imaging developer toolkit that offers image conversion, creation, editing, annotation and more. It supports more than 100 formats such as DICOM, PDF, Microsoft Office and others. An adversary could send a... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-02-24 10:13:34 Vulnerability Spotlight: Out-of-bounds read vulnerability in Slic3r could lead to information disclosure (lien direct) Lilith >_> of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered an out-of-bounds read vulnerability in Slic3r's library. Slic3r is an open-source 3-D printing toolbox, mainly utilized for translating assorted 3-D printing model file types into machine code for a specific printer. The software uses libslic3er to perform most of the non-GUI-based processes such as reading various file formats, converting formats and outputting appropriate gcode... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-01-28 11:00:05 Threat Source newsletter (Jan. 28, 2021) (lien direct) Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.   Unfortunately, I don't have any stock tips to give you to help you get rich overnight. But I do have two Vulnerability Spotlights you should read so your network can stay safer. We disclosed multiple vulnerabilities in phpGACL and Micrium uc-HTTP. There are patches available for both products and Snort rules for extra coverage.  The biggest news in the security community this week is a recently disclosed that a... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2021-01-07 07:31:39 Vulnerability Spotlight: Denial-of-service vulnerability in Rockwell Automation RSLinx (lien direct)   Alexander Perez-Palma of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered a denial-of-service vulnerability in the Ethernet/IP server functionality of Rockwell Automation RSLinx Classic. An attacker could exploit this vulnerability by sending the target a series of malicious packets. RSLinx Classic software is a communication server for the MicroLogix 1100 Programmable Controller. It helps plant devices communicate with other Rockwell... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-12-09 08:31:39 Vulnerability Spotlight: Multiple vulnerabilities in Foxit PDF Reader JavaScript engine (lien direct) Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Executive summary Cisco Talos recently discovered multiple vulnerabilities in Foxit PDF Reader's JavaScript engine. Foxit PDF Reader is a commonly used PDF reader that contains many features, including the support of JavaScript, which allows it to support interactive documents and dynamic forms. An adversary could take advantage of this JavaScript functionality, sending the victim a specially crafted file to... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-12-09 06:16:47 Vulnerability Spotlight: Remote code execution vulnerabilities in Schneider Electric EcoStruxure (lien direct) Alexander Perez-Palma and Jared Rittle of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered two code execution vulnerabilities in Schneider Electric EcoStruxure. An attacker could exploit these vulnerabilities by sending the victim a specially crafted network request or project archive. coStruxure Control Expert (formerly UnityPro) is Schneider Electric's flagship software for program development, maintenance, and monitoring of industrial... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-12-08 11:09:26 Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel (lien direct) Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered a code execution vulnerability in some versions of Microsoft Excel. An attacker could exploit this vulnerability by tricking the victim into opening a specially crafted XLS file, triggering a use-after-free condition and allowing them to execute remote code on the victim machine. Microsoft disclosed and patched this bug as part of their monthly security update Tuesday. For... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-12-02 13:21:40 Vulnerability Spotlight: DoS, code execution vulnerabilities in EIP Stack Group OpENer (lien direct) Martin Zeiser and Jared Rittle of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Executive summary Cisco Talos recently discovered two vulnerabilities in the Ethernet/IP function of EIP Stack Group OpENer. OpENer is an Ethernet/IP stack for I/O adapter devices. It supports multiple I/O and explicit connections and includes objects and services for making Ethernet/IP-compliant products as defined in the ODVA specifications. The software contains two vulnerabilities that could... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-11-30 09:26:06 Vulnerability Spotlight: Multiple vulnerabilities in WebKit (lien direct) Marcin “Icewall” Noga of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Executive summary The WebKit browser engine contains multiple vulnerabilities in various functions of the software. A malicious web page code could trigger multiple use-after-free errors, which could lead to remote and arbitrary code execution. An attacker could exploit these vulnerabilities by tricking the user into visiting a specially crafted, malicious web page on a browser utilizing WebKit. In... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability Guideline
2020-11-12 12:15:40 Vulnerability Spotlight: Multiple vulnerabilities in Pixar OpenUSD affects some versions of macOS (lien direct) Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Aleksandar Nikolic and Jon Munshaw. Pixar OpenUSD contains multiple vulnerabilities that attackers could exploit to carry out a variety of malicious actions.  OpenUSD stands for “Open Universal Scene Descriptor.” Pixar uses this software for several types of animation tasks, including swapping arbitrary 3-D scenes that are composed of many different elements. Aimed at professional animation studios, the software is... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-11-10 13:33:47 Microsoft Patch Tuesday for Nov. 2020 - Snort rules and prominent vulnerabilities (lien direct)   By Jon Munshaw, with contributions from Joe Marshall. Microsoft released its monthly security update Tuesday, disclosing just over 110 vulnerabilities across its products. This is a slight jump from last month when Microsoft disclosed one of their lowest vulnerability totals in months.   Eighteen of the vulnerabilities are considered “critical" while the vast remainder are ranked as “important,” with two also considered of “low” importance. Users of all Microsoft and Windows... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-11-05 14:01:09 Vulnerability Spotlight: Multiple JavaScript vulnerabilities in Adobe Acrobat Reader (lien direct)  Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Joe Marshall Cisco Talos recently discovered an heap buffer overflow and a use after free vulnerability in Adobe Acrobat Reader. Adobe Acrobat Reader is one of the most popular and feature-rich PDF readers on the market. It has a large user base and is usually a default PDF reader on systems. It also integrates into web browsers as a plugin for rendering PDFs. As such, tricking a user into visiting a malicious... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-10-29 14:45:29 Vulnerability Spotlight: Multiple vulnerabilities in Synology SRM (Synology Router Manager) (lien direct)   Claudio Bozzato of Cisco Talos discovered these vulnerabilities. Blog by Claudio Bozzato and Jon Munshaw. Cisco Talos recently discovered multiple remote vulnerabilities in software that helps power Synology routers. The bugs exist in Synology Router Manager (SRM) - a Linux-based operating system for Synology routers - and QuickConnect, a feature inside SRM that allows users to remotely connect to their routers. An adversary could use these vulnerabilities to carry out a range of... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-10-21 13:17:10 Vulnerability Spotlight: A deep dive into WAGO\'s cloud connectivity and the vulnerabilities that arise (lien direct)  Vulnerability Spotlight: A deep dive into WAGO's cloud connectivity and the vulnerabilities that ariseReport and research by Kelly Leuschner. WAGO makes several programmable automation controllers that are used in many industries including automotive, rail, power engineering, manufacturing and building management. Cisco Talos discovered 41 vulnerabilities in their PFC200 and PFC100 controllers. In accordance with our coordinated disclosure policy, Cisco Talos worked with WAGO to ensure... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-10-21 08:27:59 (Déjà vu) Vulnerability Spotlight: Code execution vulnerability in Google Chrome WebGL (lien direct)   Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. The Google Chrome web browser contains a vulnerability that could be exploited by an adversary to gain the ability to execute code on the victim machine. Chrome is one of the most popular web browsers currently available to users. Cisco Talos researchers recently discovered a bug in WebGL, which is a Chrome API responsible for displaying 3-D graphics. In accordance with our coordinated disclosure policy,... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-10-15 08:08:07 Vulnerability Spotlight: Code execution, information disclosure vulnerabilities in F2FS toolset (lien direct) Vulnerabilities discovered by a Cisco Talos researcher. Blog by Jon Munshaw. Cisco Talos recently discovered multiple code execution and information disclosure vulnerabilities in various functions of the F2FS toolset. F2FS is a filesystem toolset commonly found in embedded devices that creates, verifies and/or fixes Flash-Friendly File System files. An attacker could provide a malicious file to the target to trigger these vulnerabilities, causing a variety of negative conditions for the... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-10-13 15:51:28 (Déjà vu) Vulnerability Spotlight: Denial of service in AMD ATIKMDAG.SYS driver (lien direct)    Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered a denial-of-service vulnerability in the ATIKMDAG.SYS driver for some AMD graphics cards. An attacker could send the victim a specially crafted D3DKMTCreateAllocation API request to cause an out-of-bounds read, leading to a denial-of-service condition. This vulnerability could be triggered from a guest account. In accordance with our coordinated disclosure policy,... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability Guideline
2020-10-13 11:22:55 Vulnerability Spotlight: Information leak vulnerability in Google Chrome WebGL (lien direct) Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. The Google Chrome web browser contains a vulnerability that could be exploited by an adversary to carry out a range of malicious actions. Chrome is one of the most popular web browsers currently available to users. Cisco Talos researchers recently discovered a bug in WebGL, which is a Chrome API responsible for displaying 3-D graphics. In accordance with our coordinated disclosure policy, Cisco Talos worked with... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-10-13 06:12:26 Vulnerability Spotlight: Denial-of-service vulnerabilities in Allen-Bradley Flex I/O (lien direct) Jared Rittle of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. The Allen-Bradley Flex input/output system contains multiple denial-of-service vulnerabilities in its ENIP request path data segment. These bugs exist specifically in the 1794-AENT FLEX I/O modular platform. It provides many I/O operations and servers as a smaller physical device compared to other similar hardware. An attacker could exploit these vulnerabilities by sending a specially crafted, malicious packet to... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-10-07 09:07:41 Vulnerability Spotlight: DoS vulnerability in ATIKMDAG.SYS AMD graphics driver (lien direct)   Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered a denial-of-service vulnerability in the ATIKMDAG.SYS driver for some AMD graphics cards. An attacker could send the victim a specially crafted D3DKMTCreateAllocation API request to cause an out-of-bounds read, leading to a denial-of-service condition. This vulnerability could be triggered from a guest account. In accordance with our coordinated disclosure policy, Cisco Talos... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability Guideline
2020-09-30 12:37:10 Vulnerability Spotlight: Remote code execution bugs in NVIDIA D3D10 driver (lien direct) Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered multiple remote code execution vulnerabilities in the NVIDIA D3D10 driver. This driver supports multiple GPUs that NVIDIA produces. An adversary could exploit these vulnerabilities by supplying the user with a malformed shader, eventually allowing them to execute code on the victim machine. These bugs could also allow the attacker to perform a guest-to-host escape through Hyper-V... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-09-28 16:19:28 Microsoft Netlogon exploitation continues to rise (lien direct) Cisco Talos is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elevation of privilege bug in Netlogon, outlined in the August Microsoft Patch Tuesday report. The vulnerability stems from a flaw in a cryptographic authentication scheme used by the Netlogon Remote Protocol which - among other things - can be used to update computer passwords by forging an authentication token for specific Netlogon functionality. This flaw allows attackers to... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-09-17 07:21:35 Vulnerability Spotlight: Remote code execution vulnerability Apple Safari (lien direct) Marcin "Icewall" Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. The Apple Safari web browser contains a remote code execution vulnerability in its Webkit feature. Specifically, an attacker could trigger a use-after-free condition in WebCore, the DOM-rendering system for Webkit used in Safari. This could give the attacker the ability to execute remote code on the victim machine. A user needs to open a specially crafted, malicious web page in Safari to trigger this... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-09-15 10:30:16 Vulnerability Spotlight: Multiple vulnerabilities in Nitro Pro PDF reader (lien direct) Cisco Talos researchers discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered multiple code execution vulnerabilities in the Nitro Pro PDF reader. Nitro PDF allows users to save, read, sign and edit PDFs on their computers. The software contains vulnerabilities that could allow adversaries to exploit a victim machine in multiple ways that would eventually allow them to execute code. In accordance with our coordinated disclosure policy, Cisco Talos worked with... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-09-14 12:16:13 Vulnerability Spotlight: Memory corruption in Google PDFium (lien direct) Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Google Chrome's PDFium feature could be exploited by an adversary to corrupt memory and potentially execute remote code. Chrome is a popular, free web browser available on all operating systems. PDFium allows users to open PDFs inside Chrome. We recently discovered a bug that would allow an adversary to send a malicious web page to a user, and then cause out-of-bounds memory access. In accordance with our... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-09-09 05:53:35 Vulnerability Spotlight: Privilege escalation in Windows 10 CLFS driver (lien direct) Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a privilege escalation vulnerability in the Windows 10 Common Log File System. CLFS is a general-purpose logging service that can be used by software clients running in user-mode or kernel-mode. A malformed CLFS log file could cause a pool overflow, and an adversary could gain the ability to execute code on the victim machine. A regular user needs to open the log file to... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-09-01 11:49:37 Vulnerability Spotlight: Code execution, memory corruption vulnerabilities in Accusoft ImageGear (lien direct)  Emmanuel Tacheau of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered two vulnerabilities in Accusoft ImageGear. The ImageGear library is a document-imaging developer toolkit to assist users with image conversion, creation, editing and more. There are vulnerabilities in certain functions of ImageGear that could allow an attacker to execute code on the victim machine or corrupt the memory of the application. In accordance with our... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-08-31 07:08:04 Vulnerability Spotlight: Multiple SQL, code injection vulnerabilities in OpenSIS (lien direct) Yuri Kramarz and Yves Younan discovered these vulnerabilities. Blog by Jon Munshaw Cisco Talos researchers recently discovered multiple vulnerabilities in the OpenSIS software family. OpenSIS is a student information management system for K-12 students. It is available in commercial and open-source versions and allows schools to create schedules and track attendance, grades and transcripts. An adversary could take advantage of these bugs to carry out a range of malicious activities, including... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-08-27 11:00:08 Threat Source newsletter for Aug. 27, 2020 (lien direct) Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.  As part of our continued look at election security ahead of the November election, we have another research paper out this week. This time, we're taking a closer look at disinformation campaigns, popularly known as “fake news.” This paper builds on the first “What to expect when you're electing” report by focusing on the infrastructure supporting these complex campaigns.  On the vulnerability side of things, we also... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability Threat
2020-08-24 12:28:24 Vulnerability Spotlight: Remote code execution, privilege escalation bugs in Microsoft Azure Sphere (lien direct) Claudio Bozzato, Lilith >_> and Dave McDaniel of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos researchers recently discovered multiple vulnerabilities in Microsoft's Azure Sphere, a cloud-connected and custom SoC platform designed specifically with IoT application security in mind. Internally, the SoC is made up of a set of several ARM cores that have different roles (e.g. running different types of applications, enforcing security, and managing... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
2020-08-24 07:44:17 Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome WebGL could lead to code execution (lien direct) Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. The Google Chrome web browser contains a use-after-free vulnerability in its WebGL component that could allow a user to execute arbitrary code in the context of the browser process. This vulnerability specifically exists in ANGLE, a compatibility layer between OpenGL and Direct3D that Chrome uses on Windows systems. An adversary could manipulate the memory layout of the browser in a way that they could gain... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
Last update at: 2024-07-21 01:08:30
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter