每日安全动态推送(9-25)
2023-9-25 14:16:33 Author: mp.weixin.qq.com(查看原文) 阅读量:3 收藏

Tencent Security Xuanwu Lab Daily News

• Zero Day Initiative — Finding Deserialization Bugs in the SolarWind Platform:
https://www.zerodayinitiative.com/blog/2023/9/21/finding-deserialization-bugs-in-the-solarwind-platform

   ・ SolarWind平台中的反序列化远程代码执行漏洞 – SecTodayBot

• PSF-2023-8:
https://osv.dev/vulnerability/PSF-2023-8

   ・ ssl.SSLSocket 容易绕过 TLS 握手,将发送的未加密数据视为握手后 TLS 加密数据 – SecTodayBot

• Supply Chain Issues in PyPI:
https://seclists.org/oss-sec/2023/q3/203

   ・ PyPI 中分发恶意包的新方法,以及包管理器和安全扫描工具如何以不同的方式解决依赖关系 – SecTodayBot

• New ways to inject system CA certificates in Android 14:
https://httptoolkit.com/blog/android-14-install-system-ca-certificate/

   ・ 向 Android 14 中注入系统 CA 证书的新方法 – SecTodayBot

• EDR Unhooking: Patching Falcon hooks without VirtualProtect:
https://inbits-sec.com/posts/in-memory-unhooking/

   ・ 无需 VirtualProtect,解除 Crowdstrike Falcon 的系统钩子 – SecTodayBot

• Conclusion:
https://8ksec.io/advanced-root-detection-bypass-techniques/

   ・ 高级 root 检测和绕过技术,以名为 RootDetector 的 root 检测应用程序为示例的分析 – SecTodayBot

• Fuzzing with multiple servers in parallel: AFL++ with Network File Systems:
https://joshua.hu/fuzzing-multiple-servers-parallel-aflplusplus-nfs

   ・ 在多个服务器上使用高并行度运行 AFL++ – SecTodayBot

• The WebP 0day:
https://blog.isosceles.com/the-webp-0day/

   ・ WebP 图像库中的堆缓冲区溢出 – SecTodayBot

• Analyzing Agniane Stealer:
https://blog.pulsedive.com/analyzing-agniane-stealer/

   ・ 分析 Agniane Stealer – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959362&idx=1&sn=4b1b060bbff05de1baf3ae7a91e1c849&chksm=8baed0ddbcd959cbb287501e882262c6517a4557baf300079a38c7af37bd668928de2ab9e941&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh