每日安全动态推送(9-15)
2023-9-15 11:7:28 Author: mp.weixin.qq.com(查看原文) 阅读量:3 收藏

Tencent Security Xuanwu Lab Daily News

• varc: collects a snapshot of volatile data from a system:
https://securityonline.info/varc-collects-a-snapshot-of-volatile-data-from-a-system/

   ・ Varc - 一种工具,用于在 AWS AWS ECS/EKS/Fargate/Kubernetes 环境中按进程收集和提取正在运行的进程中的内存数据  – SecTodayBot

• About the Speaker:
https://bit.ly/3r55KiH

   ・ GitHub Workflows - 基于模糊测试、符号执行和静态分析来识别 CI/CD 管道中代码注入错误的污点跟踪工具 – SecTodayBot

• CVE-2023-38039 curl: HTTP headers eat all memory:
https://seclists.org/oss-sec/2023/q3/175

   ・ CVE-2023-38039 curl中的漏洞,HTTP 标头会占用所有内存 。受影响的版本:libcuril 7.84.0 到(包括 8.2.1 和 8.2)。  – SecTodayBot

• The Hacker Perspective on Generative AI and Cybersecurity:
https://bit.ly/45WkOxC

   ・ 从黑客视角来看生成式人工智能和网络安全 – SecTodayBot

• CVE-2022-41099 - Analysis of a BitLocker Drive Encryption Bypass:
https://itm4n.github.io/cve-2022-41099-analysis-bitlocker-drive-encryption-bypass/

   ・ CVE-2022-41099 - BitLocker 驱动器加密绕过漏洞分析  – SecTodayBot

• CVE-2023-4039: GCC's -fstack-protector fails to guard dynamic stack allocations on ARM64:
https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html

   ・ GCC 的栈溢出保护可防止攻击者利用其编译的代码中的堆栈缓冲区溢出错误,但当易受攻击的缓冲区是可变长度数组或 alloca() 分配且目标体系结构是 64 位 ARM64 时,该保护不起作用  – SecTodayBot

• Konni APT 利用 WinRAR 漏洞(CVE-2023-38831)首次攻击数字货币行业:
https://paper.seebug.org/3032/

   ・ Konni APT 组织利用 WinRAR 漏洞(CVE-2023-38831)首次攻击数字货币行业 – lanying37

• HTTP-Shell - MultiPlatform HTTP Reverse Shell:
http://dlvr.it/Svvm7B

   ・ HTTP-Shell - 多平台 HTTP 反向 Shell - 用于在 HTTP 反向连接上获取类 Shell 接口的工具 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959356&idx=1&sn=1ac299bbb181928af6bd8e621152c4cc&chksm=8baed0a3bcd959b53a137a8fbd86b9a236bb725f592b9fd9598c668119ddccb24e3f21795a4a&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh