每日安全资讯-2020.2.12

声明:本文所有内容仅用于学习和研究目的,且不能违反《网络安全法》、《刑法》等相关要求,尤其禁止传播,或用于非善良目的。您查看本文,即视为遵守以上约定,否则责任自负。

今日导读:Trickbot,Emotet使用有关Trump的文字逃避检测、适用于Windows的许多Ricoh打印机驱动程序中的本地提权漏洞、Windows MSI“安装程序服务”提权漏洞、CORSAIR iCUE驱动程序本地提权、Project Zero教你调试chrome漏洞等。

【病毒区】
1、Trickbot, Emotet Use Text About Trump to Evade Detection

【漏洞分析区】
2、Local Privilege Escalation in many Ricoh Printer Drivers for Windows (CVE-2019-19363)
3、CVE-2020-0683:Windows MSI “Installer service” Elevation of Privilege
4、CORSAIR iCUE Driver Local Privilege Escalation (CVE-2020-8808)
5、Mozila WebThings Gateway Interfaces.d to RCE
6、CVE-2020-0759 - Microsoft Office Excel Ordinal43 code execution vulnerability
7、CVE-2020-0738 - Microsoft Media Foundation IMFASFSplitter::Initialize Code Execution Vuln.
8、Mario Kart 8 as a primary exploit for homebrew on the Wii U

【技术分享区】
9、A day^W^W Several months in the life of Project Zero - Part 1: The Chrome bug of suffering
10、A day^W^W Several months in the life of Project Zero - Part 2: The Chrome exploit of suffering
11、Redirect attack on Shadowsocks stream ciphers
12、Analyzing the Linux Kernel in Userland with AFL and KLEE
13、Understanding Trusted Execution Environments and Arm TrustZone
14、The Mobile Hacking CheatSheet is an attempt to summarise a few interesting basics info regarding tools and commands needed to assess the security of Android and iOS mobile applications.
工具-django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC

1