Tencent Security Xuanwu Lab Daily News
• Checkmk: Remote Code Execution by Chaining Multiple Bugs (1/3):
https://blog.sonarsource.com/checkmk-rce-chain-1/
・ 组合多个漏洞实现 IT 监控产品 Checkmk 的 RCE
– Jett
• [PDF] https://airbus-seclab.github.io/netbackup/Hexacon2022-The_unavoidable_pain_of_backups_security_deep-dive_into_the_internals_of_NetBackup.pdf:
https://airbus-seclab.github.io/netbackup/Hexacon2022-The_unavoidable_pain_of_backups_security_deep-dive_into_the_internals_of_NetBackup.pdf
・ Veritas NetBackup 网络备份方案的实现机制分析与漏洞挖掘
– Jett
• [macOS] A tale of a simple Apple kernel bug:
https://pwning.systems/posts/easy-apple-kernel-bug/
・ XNU 内核 RAM Disk 驱动 CVE-2022-26743 漏洞的分析
– Jett
• Stranger Strings: An exploitable flaw in SQLite:
https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
・ SQLite 字符串格式化处理过程中的一个任意代码执行漏洞(CVE-2022-35737)
– Jett
• Gregor Samsa: Exploiting Java’s XML Signature Verification:
https://googleprojectzero.blogspot.com/2022/11/gregor-samsa-exploiting-java-xml.html
・ Java XML Signature 验证过程中用于处理 XSLT 的 JIT compiler 被发现整数截断漏洞,可以被远程攻击利用
– Jett
• [Tools] urlscan.io’s SOAR spot: Chatty security tools leaking private data | Positive Security:
https://positive.security/blog/urlscan-data-leaks
・ urlscan.io 网站被发现泄露了大量用户的敏感 URL,通过自动化工具可以挖掘出文档分享、密码重置以及团队邀请等敏感链接
– Jett
• [CVE-2022-1786] A Journey To The Dawn:
https://blog.kylebot.net/2022/10/16/CVE-2022-1786/
・ Linux 内核 io_uring 子系统 CVE-2022-1786 漏洞的分析和利用
– Jett
• Hardware Trojans Under a Microscope:
https://ryancor.medium.com/hardware-trojans-under-a-microscope-bf542acbcc29
・ 硬件级木马技术研究
– Jett
• [Windows] Technical Analysis of Windows CLFS Zero-Day Vulnerability CVE-2022-37969 – Part 1: Root Cause Analysis:
https://www.zscaler.com/blogs/security-research/technical-analysis-windows-clfs-zero-day-vulnerability-cve-2022-37969-part
・ Windows CLFS 日志文件系统驱动提权漏洞 CVE-2022-37969 的分析,该漏洞因野外利用被发现
– Jett
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(11-03)