Harry Sintonen
Infosec consultant at REVƎЯSEC https://reversec.com/ - Coding, Research + various other interests
- 19 Posts
- 17 Comments
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#curl predecessor httpget 0.2 from around 1996/1997 is 165 lines. Needless to say, it has multiple critical security vulnerabilities. How many can you spot?1·3 months agoThe httpget 0.2 doesn’t quite work in the form it was uploaded.
First it uses hardcoded argv, argc instead of getting from the app invocation (as args in main, the code uses void main).
Second obtaining any data from the socket will result in the app stopping and leaving behind an empty file (if (nread) break;).
This program could never download anything. It is likely some work in progress or modified test version of httpget. Since it includes some windows specific headers and has disabled the unix ones I can only presume it was some earlier attempt to get the tool running on windows.
So while the code has a local stack buffer overflow it can’t be triggered for this early version.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•As expected #Apple has nuked Advanced Data Protection (ADP) for UK users. What does this mean in practice? UK govt will be able to decrypt all UK user's #iCloud data at will.1·3 months agoIf this trend continues, we will be losing the ability to use secure means of communication with UK friends and colleagues. For example, #signalapp will rather get out of the UK than add backdoors: https://www.bbc.com/news/technology-64584001
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#Nordnet - nordic digital platform for savings and investments - had an issue where people could see each others information. The website has been taken down for now.1·3 months ago“#Nordnet admits that it was possible to trade in other people’s depots during the IT breakdown”
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#Nordnet - nordic digital platform for savings and investments - had an issue where people could see each others information. The website has been taken down for now.1·3 months ago#Nordnet services appear to be back.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#Nordnet - nordic digital platform for savings and investments - had an issue where people could see each others information. The website has been taken down for now.1·3 months agoNordnet has a lot of technical issues to sort out. If the malfunction allowed unauthorized parties to operate the accounts it will be quite messy to sort out.
Among with technical part, they will have to deal with the regulatory issues, in particular the Financial Supervisory Authority. They will demand answers.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#cURL doesn't validate SSH host identity if known_hosts file is missing. I think this is a #vulnerability, but the project disagrees. Advisory is here:2·3 months ago@SatyrSack@feddit.org Curl will likely address this eventually even though they don’t consider it a vulnerability. See https://github.com/curl/curl/issues/16197
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#cURL doesn't validate SSH host identity if known_hosts file is missing. I think this is a #vulnerability, but the project disagrees. Advisory is here:3·3 months agoThe latest curl version 8.12.0 (released today) is affected.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently there's a major #vulnerability in #AMD CPUs: "AMD Microcode Signature Verification Vulnerability."1·3 months agoThe details of the #AMD Microcode Signature Verification #Vulnerability are out:
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
- https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w
#infosec #infosecurity #cybersecurity
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•A company appears to be abusing #BugCrowd’s #bugbounty program to hide essential details of a critical vulnerability. The company itself has rated the vulnerability as low severity. This has led many1·4 months agoThe company doing this is https://www.n-able.com/ - here’s are the details: https://sintonen.fi/advisories/n-able-ecosystem-agent-improper-certificate-validation.txt
…except for the PoC exploit which is insanely simple to pull off. Anyone with #mitmproxy and half a brain can do it.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently there's a major #vulnerability in #AMD CPUs: "AMD Microcode Signature Verification Vulnerability."3·4 months agoSo what could you do if the microcode signature verification can be bypassed? While not directly applicable, this #defcon presentation “DEF CON 31 - Backdoor in the Core - Altering Intel x86 Instruction Set at Runtime - Krog, Skovsende” gives some ideas: https://www.youtube.com/watch?v=Zda7yMbbW7s
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently there's a major #vulnerability in #AMD CPUs: "AMD Microcode Signature Verification Vulnerability."2·4 months ago@gabrielesvelto Yeah, information for that vulnerability is non-existent as well. In all the vulnerability management doesn’t seem to be going great here.
Update: The “PeCoffLoader memory overflow issue for security” likely is CVE-2024-38796: https://nvd.nist.gov/vuln/detail/cve-2024-38796
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently #macOS now considers #Docker malware.5·4 months agoI had actually forgotten I still had Docker installed on this system. I’ve now fixed this issue by uninstalling the malicious app. I’m using #podman elsewhere already, just had this install lingering still. Apple: Thanks for the warning!
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently #macOS now considers #Docker malware.4·4 months ago@g@irrelephant.co Oof, that’s not good at all.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•In January 2022 I discovered that #Microsoft #Office365 Message #Encryption (OME) utilized Electronic Codebook (ECB) mode of operation. I reported this, got paid a $5000 bounty and then things fell1·6 months ago@screaminggoat@infosec.exchange Yep, that’s the one.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•A company appears to be abusing #BugCrowd’s #bugbounty program to hide essential details of a critical vulnerability. The company itself has rated the vulnerability as low severity. This has led many1·9 months ago@EndlessMason@hachyderm.io No struggle really, just figuring out the details.
As to bounty: I think they’re just using the BugCrowd platform to manage their vulnerability program. At no point did they promise any rewards, nor did I expect any.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•A company appears to be abusing #BugCrowd’s #bugbounty program to hide essential details of a critical vulnerability. The company itself has rated the vulnerability as low severity. This has led many1·9 months ago@EndlessMason@hachyderm.io I presume they will kick me out of the BugCrowd platform. I have no problem with that really. I’ve already considered the platform and this bug bounty in particular a lost cause.
@jerry It largely depends on how well the initial impact is cleaned up. I’m hoping we won’t see a ton of backdoors in various components next.