skip to main | skip to sidebar
Where facts are few, experts are many.
  • Home
  • Menu
    • About Me
    • Research and Presentations
    • Vulnerability Disclosure Policy
    • Old archived Blog
  • Contact
    • Mail
  • Subscribe to Feed
Advisory : One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....
| 0 comments ]

Subscribe to the RSS feed in case you are interested in updates
  • [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....



0 comments

Post a Comment

Newer Post Older Post Home

About Me

My photo
Thierry Zoller
Welcome to my blog covering Information Security and Privacy.



CISO during the day.

Quick-links
▪ About me
▪ Tools / Talks / Whitepapers
▪ Vulnerability disclosure policy
▪ Subsribe to RSS Feed

View my complete profile

  • Follow me on Twitter
  • Follow me on Linked-in

  • The views and opinions expressed on this blog are my personal views and are not intended to reflect the views of my employer or any other entity.

    Total Pageviews

    Blog Archive

    • ►  2020 (11)
      • ►  July (4)
      • ►  May (2)
      • ►  April (2)
      • ►  March (1)
      • ►  January (2)
    • ►  2017 (1)
      • ►  October (1)
    • ►  2013 (4)
      • ►  July (1)
      • ►  June (1)
      • ►  March (2)
    • ►  2012 (11)
      • ►  November (1)
      • ►  August (2)
      • ►  July (1)
      • ►  June (4)
      • ►  May (2)
      • ►  March (1)
    • ►  2011 (10)
      • ►  December (3)
      • ►  November (1)
      • ►  October (2)
      • ►  September (2)
      • ►  August (2)
    • ►  2010 (6)
      • ►  August (1)
      • ►  July (1)
      • ►  March (2)
      • ►  February (2)
    • ▼  2009 (80)
      • ►  November (2)
      • ►  October (1)
      • ►  September (3)
      • ▼  July (3)
        • New advances in Office malware analysis
        • Advisory : One bug to rule them all - Firefox, IE...
        • 0pen0wn.c - Shellcode "dissasembled"
      • ►  June (2)
      • ►  May (22)
      • ►  April (16)
      • ►  March (17)
      • ►  February (7)
      • ►  January (7)
    • ►  2008 (31)
      • ►  December (2)
      • ►  November (7)
      • ►  October (7)
      • ►  September (3)
      • ►  August (12)
    • ►  2007 (7)
      • ►  October (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2006 (6)
      • ►  December (1)
      • ►  August (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2005 (9)
      • ►  October (1)
      • ►  April (7)
      • ►  January (1)
    • ►  2000 (1)
      • ►  March (1)

    Featured Post

    A Primer on dealing with the DPA of Luxembourg - the CNPD

    This blog post will be updated periodically as I come across new practical information and experiences. You can subscribe to my blog if you ...

    Popular Posts

    • Advisory : Firefox Denial of Service (KEYGEN)
      Comment: I have received interesting and mixed feedback from posting the above "bug". First I'd like to clarify that a vulner...
    • CVE-2010-x+n - Loadlibrary/Getprocaddress roars its evil head in 2010
      Subscribe to the RSS feed in case you are interested in updates After Acrossecurity , published an interesting vulnerability and HDmoo...
    • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
      Table of Contents Updates Bulletins Am I at risk ? Tools Technical details 0.1 Personal message Several news stories seem to allu...
    • Advisory : F-Prot (Frisk) - CAB bypass / evasions
      CHEAP Plug : ************ You are invited to participate in HACK.LU 2009, a small but concentrated luxemburgish security conference. More ...
    • SSL Audit v.08 released
      I have updated my little TLS/SSL Scanner called "SSL Audit" to version 0.8. I tweaked it slightly but the tool is still based o...

    Blogs I read

    • Krebs on Security
      ‘Snatch’ Ransom Group Exposes Visitor IP Addresses - The victim shaming site operated by the Snatch ransomware group is leaking data about its true online location and internal operations, as well as the Inte...
      6 hours ago
    • Schneier on Security
      Critical Vulnerability in libwebp Library - Both Apple and Google have recently reported critical vulnerabilities in their systems—iOS and Chrome, respectively—that are ultimately the result of the...
      7 hours ago
    • Troy Hunt
      Weekly Update 366 - Well that's it, Europe is done! I've spent the week in Prague with highlights including catching up with Josef Prusa, keynoting at Experts Live EU and ta...
      5 days ago
    • Cup of Security
      Refrigerator Pickles - #Refrigerator #Pickles
      1 week ago
    • CrySyS Blog
      Gépi Tanulás & Adatbiztonsági Támadások - Ez a blogposzt az első egy két részes sorozatból mely a gépi tanulás adatbiztonsági kockázatairól kíván közérthető nyelven egy átfogó képet nyújtani. Ez a ...
      1 week ago
    • Lenny Zeltser on Information Security
      A Report Template for Incident Response - Preparing for cybersecurity and data privacy incidents involves creating checklists and documented plans to enable the response team to do their best durin...
      2 weeks ago
    • Didier Stevens
      Update: zipdump.py Version 0.0.28 - This is an update linked to option -f l to find PKZIP records. When option -E all is used, field externalattributes is parsed now: zipdump_v0_0_28.zip (htt...
      3 weeks ago
    • A Few Thoughts on Cryptographic Engineering
      Some rough impressions of Worldcoin - Recently a reader wrote in and asked if I would look at Sam Altman’s Worldcoin, presumably to give thoughts on it from a privacy perspective. This was hone...
      5 weeks ago
    • TaoSecurity
      My Last Email with W. Richard Stevens - In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book *TCP/IP Illustrated, Volume 1: The Protocols* by W. Richard Stevens...
      3 months ago
    • Uncommon Sense Security
      What a lovely sunset - Oh, hi. Long time no blog, eh? Well, it is time to sunset this blog, I will be deleting it in the next few weeks. So long, and thanks for all the fis...
      4 months ago
    • Securosis Highlights
      The THIRTEENTH Annual Disaster Recovery Breakfast: Changing of the Guard - Posted under: What a long, strange trip it’s been over the last 3 years. In fact, the last time I saw many of you was at the last Disaster Recovery Breakf...
      5 months ago
    • contagio
      Malware Arsenal used by Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) in attacks targeting Ukraine (samples) - *2023-02-18* Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) is an Advance...
      7 months ago
    • root labs rdist
      Rebooting - I’ve recently had some time to catch up on reading and research. I’ve decided to start writing again here about cryptography, embedded systems, and securit...
      10 months ago
    • VRT
      Attackers use domain fronting technique to target Myanmar with Cobalt Strike - By Chetan Raghuprasad, Vanja Svajcer and Asheer Malhotra. News Summary Cisco Talos discovered a new malicious campaign using a leaked version of Cobalt Str...
      1 year ago
    • Chatter on the Wire: How excessive network traffic gives away too much!
      Satori Updates - I've continued to update Satori little by little out there on github. Both updating the underlying code and fingerprints. Always happy to have new id...
      1 year ago
    • Security
      Recovering "lost" treasure-filled floppy discs with an oscilloscope - There are many good, modern solutions for reading data off old floppy discs and drives. Perhaps the best is the Greaseweazle: it's capable, open source, ...
      2 years ago
    • Privacy Law Blog
      The Future of the FTC: Part II - A previous blog post discussed FTC Chairwoman Slaughter’s first priority as the newly designated chairwoman – the COVID-19 pandemic. The FTC’s second prior...
      2 years ago
    • Carnal0wnage & Attack Research Blog
      WeirdAAL update - get EC2 snapshots - I watched a good DEF CON video on abusing public AWS Snapshots https://www.youtube.com/watch?v=-LGR63yCTts I, of course, wanted to check this out. There a...
      3 years ago
    • GreyHatHacker.NET
      Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability - Last November I reported a kernel vulnerability to CERT/CC for their help in coordinating the disclosure as it impacted dozens of vendors including Google ...
      4 years ago
    • /dev/ttyS0
      Protected: TP-Link is Bullshit - There is no excerpt because this is a protected post.
      5 years ago
    • newsoft's fun blog
      SSTIC 2018 - Nous sommes en 2018. Fuites de données, attaques massives, failles structurelles, le monde constate chaque jour un peu plus à quel point la sécurité est ...
      5 years ago
    • Arne Swinnen's Security Blog - Just Another Infosec Blog
      Authentication bypass on Uber’s Single Sign-On via subdomain takeover - TL;DR: Uber was vulnerable to subdomain takeover on saostatic.uber.com via Amazon CloudFront CDN. Moreover, Uber’s recently deployed Single Sign-On (SSO) s...
      6 years ago
    • Claude Adam
      En français svp? - Mir stelle fest, datt graff vereinfacht, zu Lëtzebuerg 100.000 Lëtzebuerger schaffen, 100.000 net-Lëtzebuerger Residenten an 200.000 Frontalieren. Datt ënn...
      6 years ago
    • Adam Shostack & friends
      Rogue One Sequel already being filmed! - There’s some really interesting leaked photos and analysis by Charles Goodman. “Leaked photos from the Rogue One sequel (Mainly Speculation – Possible Spoi...
      6 years ago
    • LuxLegal
      La réforme des allocations familiales : une nouvelle atteinte aux droits des familles recomposées ? - Alors que la Cour de Justice de l’Union Européenne est toujours saisie de litiges concernant des enfants étudiants issus de familles recomposées s’étant vu...
      7 years ago
    • Secure Belief
      VulnHub Stapler 1 Solution 2 - You can find Solution 1 here. After spending a night on this, I finally managed to solve the 2nd way to get limited shell on this box. Let's see how this ...
      7 years ago
    • Fun Over IP
      McAfee SiteList.xml password decryption - Recently, a very good friend of mine (@Sn0rkY) pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml fil...
      7 years ago
    • Scrammed!
      A WinDbg extension to print the kernel memory layout - WinDbg is an awesome debugger, but I always missed the nice, compact and tidy view of the process memory layout that you have in OllyDbg (in *View->Memory*...
      8 years ago
    • mossmann's blog
      Learning SDR - I recently launched Software Defined Radio with HackRF, an instructional video series that I hope will make it easier than ever for people to learn the bas...
      9 years ago
    • Java security and related topics
      USENIX Security Symposium Slides - We're very happy to present the paper Revisiting SSL/TLS Implementations - New Bleichenbacher Side Channels and Attacks by Christopher Meyer, Juraj Somo...
      9 years ago
    • The iSecLab Blog [by Faculty and Students];
      New Insights into Email Spam Operations - Our group has been studying spamming botnets for a while, and our efforts in developing mitigation techniques and taking down botnets have contributed in d...
      9 years ago
    • Amrit Williams Blog
      RSA Announces End of RSA Security Conference - Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today ...
      9 years ago
    • ax330d's blog
      Samsung Galaxy S5 could be cheaper than Galaxy S4 - Good news for would-be Samsung Galaxy S5 customers - the main smartphone may end up being more economical as opposed to Galaxy S4 was when it established. ...
      9 years ago
    • Cognitive Dissidents
      Why I _am_ Speaking At RSA 2014 - There’s been quite a bit of drama with regards to whether or not to boycott the RSA conference over a deal that the RSA security vendor had made with the N...
      9 years ago
    • Ma petite parcelle d'Internet...
      Router backdoor reloaded... - S i vous avez aimé l'histoire de la backdoor D-Link, vous allez A-DO-RER celle-ci. C'est encore sur /dev/ttyS0 que ça se passe, où on apprend que les route...
      9 years ago
    • Androguard
      One year after, end of Magnificent 7 project ! - It has been a year already since the start of the Magnificient 7 program ! So what happened during this year ? We added some features to enhance your analy...
      10 years ago
    • Digital Forensics is a Science
      Mobile Device Forensics - Course Update - It's been a few weeks since the last update, but things have been busy. The Fall 2012 term is now in Week 5 (wow, the semester is flying by). We've covered...
      11 years ago
    • Nynaeve
      NWScript JIT engine: Wrap-up (for now) - Yesterday, I provided a brief performance overview of the MSIL JIT backend versus my implementation of an interpretive VM for various workloads. Today, I’l...
      13 years ago
    • IBM Internet Security Systems Frequency X Blog
      -
    • CryptoLUX - Recent changes [en]
      -
    • rmhrisk.wpengine.com/
      -
    • Metasploit
      -
    • woanware
      -
    • ...And You Will Know me by the Trail of Bits
      -
    Show 10 Show All

    Links

    • Schneier on Security
    • Brian Krebs on Security
    • Lenny Zeltser
    • Malware LU
    • CryptoLux
    • Unmitigated Risk
    • TaoSecurity - Bejtlich
    • root labs rdist
    • Securosis Blog
    • Trail of Bits
    • Sid's Blog [FR]
    • Fun over IP
    • Hack.lu
    • Joe Sandbox
    • SVEN

    Labels

    • Advisory (53)
    • Rants from Thierry (25)
    • Tool (19)
    • Vulnerabilties (13)
    • Misc (10)
    • Interesting Reads (8)
    • 0day (7)
    • How-to (7)
    • Luxembourg (4)
    • Whitepaper (4)
    • Hardware hacking (2)
    • Constitution (1)
     
    Copyright Musings on Information Security and Data Privacy