The effort was inspired by Fortinet's CVE-2018-1040 from last year. Original write-up: https://www.fortinet.com/blog/threat-research/microsoft-windows-remote-kernel-crash-vulnerability.html …. Thanks!
-
-
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Also LOL, TrueType fonts again.
-
Never Ending Story
Kraj razgovora
Novi razgovor -
-
-
I reported a similar bug back in 2011 (CVE-2011-1971), it happens at pe section alignment/copying
-
Nice, thanks for pointing it out :)
Kraj razgovora
Novi razgovor -
-
-
Thanks for sharing! No potential exploitable bugs in PE parsing, only null deref and oob read?
-
Yes, fortunately nothing more serious than that
Kraj razgovora
Novi razgovor -
-
-
Tell me you called your fuzzer PEwPEw
-
Oh no
such a wasted opportunity! - Još 2 druga odgovora
Novi razgovor -
-
-
I don't understand how a data file could crash anything just by existing on disk, outside of being scanned by the malicous detection in windows. Did I misunderstand the statement or maybe not understanding how it crashed?
-
The crashes are triggered by some extremely common APIs such as GetFileVersionInfoW, which will usually get called by _something_ when the poc is written to the file system: the anti-malware service, the browser used to download it, explorer etc.
- Još 1 odgovor
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.