每日安全动态推送(4-16)

Tencent Security Xuanwu Lab Daily News

• Re: [RESEND RFC] kernel/ksysfs.c: restrict /sys/kernel/notes to root access – Kees Cook:
https://lore.kernel.org/all/202402180028.6DB512C50@keescook/

   ・ 讨论了限制非特权用户访问某些内核注释以避免安全攻击的措施,以及详细分析了启动地址的暴露如何绕过KASLR(内核地址空间布局随机化) – SecTodayBot


• OpenClinic GA 5.247.01 – Path Traversal (Authenticated):
https://dlvr.it/T5WGX9

   ・ OpenClinic GA版本5.247.01中的路径遍历漏洞 – SecTodayBot


• Toolkit – The Essential Toolkit For Reversing, Malware Analysis, And Cracking:
https://www.kitploit.com/2024/04/toolkit-essential-toolkit-for-reversing.html

   ・ 介绍了一个用于逆向工程、恶意软件分析和破解的工具包 – SecTodayBot


• Exploits Explained: ZIP embedding attack on Google Chrome extensions:
https://readme.synack.com/exploits-explained-zip-embedding-attack-on-google-chrome-extensions

   ・ 示了对Google Chrome浏览器扩展的ZIP嵌入攻击漏洞 – SecTodayBot


• Jenkins 2.441 – Local File Inclusion:
https://dlvr.it/T5WFqR

   ・ Jenkins 2.441存在本地文件包含漏洞(CVE-2024-23897) – SecTodayBot


• oss-security – Linux: Disabling network namespaces:
https://www.openwall.com/lists/oss-security/2024/04/14/1

   ・ 介绍了针对Linux内核漏洞的新的缓解技术,主要讨论了使用特定内核参数作为缓解技术的介绍。同时也提到了最近被利用的Netfilter CVE-2024-1086漏洞 – SecTodayBot


• Using the LockBit builder to generate targeted ransomware:
https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/

   ・ 文章介绍了LockBit 3.0 builder的文件构成、自定义勒索软件的生成过程,以及预防活动列表。 – SecTodayBot


• Sniping at web applications to discover input-handling vulnerabilities:
https://link.springer.com/article/10.1007/s11416-024-00518-0

   ・ 探讨了针对Web应用程序的模糊测试方法,提出了针对Web应用程序的模块化架构,以提高模糊测试的有效性 – SecTodayBot


• Catcher(捕手):
https://github.com/wudijun/Catcher?tab=readme-ov-file

   ・ Catcher是一个用于系统指纹漏洞验证和资产梳理的工具,可以进行指纹识别、漏洞验证、cdn判断和端口扫描。 – SecTodayBot


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号: 腾讯玄武实验室
https://weibo.com/xuanwulab

原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(4-16)

版权声明:admin 发表于 2024年4月16日 下午3:50。
转载请注明:每日安全动态推送(4-16) | CTF导航

相关文章