-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
d173d1c
commit bc9c7da
Showing
3 changed files
with
93 additions
and
0 deletions.
There are no files selected for viewing
33 changes: 33 additions & 0 deletions
33
...s/Linux-RCE-exploited-in-the-wild-via-CUPS-Print-Scheduler-before-disclosure.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
--- | ||
title: Linux RCE exploited in the wild via CUPS Print Scheduler before disclosure | ||
date: 2024-09-29 22:47:59 | ||
tags: | ||
- linux | ||
- cups | ||
- rce | ||
- exploit | ||
- print scheduler | ||
--- | ||
|
||
### Quick Report | ||
|
||
A high profile vulnerability with a CVSS score of 9.9 by RHEL and Canonical affecting widely used print server installed by default on many Linux and UNIX systems. The exploit discovered is a remote code execution vulnerability in the CUPS Print Scheduler allows attackers to run arbitrary code on the system without any user interaction required. | ||
<!-- more --> | ||
|
||
Summary of the vulnerability: | ||
> CVE-2024-47176 | cups-browsed <= 2.0.1 binds on UDP INADDR_ANY:631 trusting any packet from any source to trigger a Get-Printer-Attributes IPP request to an attacker controlled URL. | ||
CVE-2024-47076 | libcupsfilters <= 2.1b1 cfGetPrinterAttributes5 does not validate or sanitize the IPP attributes returned from an IPP server, providing attacker controlled data to the rest of the CUPS system. | ||
CVE-2024-47175 | libppd <= 2.1b1 ppdCreatePPDFromIPP2 does not validate or sanitize the IPP attributes when writing them to a temporary PPD file, allowing the injection of attacker controlled data in the resulting PPD. | ||
CVE-2024-47177 | cups-filters <= 2.0.1 foomatic-rip allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter. | ||
|
||
### Source(s) | ||
|
||
- [TPU][def] | ||
- [Evil Socket][def2] | ||
- [Github Gist][def3] | ||
- [Shodan.io][def4] | ||
|
||
[def]: https://www.techpowerup.com/327067/new-linux-rce-vulnerability-leaks-ahead-of-disclosure-allows-arbitrary-code-execution-via-cups-print-scheduler | ||
[def2]: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/#Internet-Printing-Protocol | ||
[def3]: https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1 | ||
[def4]: https://www.shodan.io/search/report?query=product%3Acups |
31 changes: 31 additions & 0 deletions
31
...soft-addresses-Security-Concerns-of-Recall-Features-on-Copilot-with-a-revamp.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
--- | ||
title: >- | ||
Microsoft addresses Security Concerns of Recall Features on Copilot+ with a | ||
revamp | ||
date: 2024-09-29 22:54:22 | ||
tags: | ||
- microsoft | ||
- copilot+ | ||
- copilot | ||
- ai | ||
- ai-powered-tools | ||
- recall | ||
- security | ||
- privacy | ||
--- | ||
|
||
### Quick Report | ||
|
||
Microsoft addressed the privacy concerns of the recall feature on Copilot+ with a revamp. The feature requires Device Encryption, TPM 2.0, Kernel DMA protection, Virtualization based Code Integrity, Secure Boot and Bitlocker to view/record with the option to disable the feature if user's feels unsafe. | ||
<!-- more --> | ||
|
||
Recall will be a Opt-In feature and users can disable it during Windows installation. By default, it will be disabled unless the user enables it. In addition, Recall needs Windows Hello based Authentication Face or Biometrics and on-device is encrypted unlike the previous version which had stored data in plain text raising security concerns. | ||
Microsoft confirmed it will not capture Private browsing, passwords, or other sensitive information with the help of Purview Privacy toolset technology developed by Microsoft. | ||
|
||
### Source(s) | ||
|
||
- [TPU][def] | ||
- [Windows Blogs][def2] | ||
|
||
[def]: https://www.techpowerup.com/327068/microsoft-revamps-recall-for-copilot-pcs-with-a-focus-on-security-concerns | ||
[def2]: https://blogs.windows.com/windowsexperience/2024/09/27/update-on-recall-security-and-privacy-architecture/ |
29 changes: 29 additions & 0 deletions
29
source/_posts/Valve-turns-Rampant-Cheaters-in-Deadlock-into-a-Frog.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
--- | ||
title: Valve turns Rampant Cheaters in Deadlock into a Frog | ||
date: 2024-09-29 22:53:29 | ||
tags: | ||
- valve | ||
- steam | ||
- moba game | ||
- deadlock | ||
- cheaters | ||
- frog | ||
- anti-cheat | ||
--- | ||
|
||
### Quick Report | ||
|
||
Valve the makers of Steam released a new MOBA-like game called Deadlock which had serious cheating problems, despite being an invite-only beta testing. Valve has now turned the cheaters into frogs. It's an anti-cheat system with conservative to avoid any false positives. | ||
<!-- more --> | ||
|
||
According to changelog from the latest update, once the anti-cheat system detects a cheater, it will prompt rest of players in the game to either kick and ban the offending player(s) ending the match immediately or turn the cheater into a frog until the match ends and ban them indefinitely. | ||
|
||
### Source(s) | ||
|
||
- [TPU][def] | ||
- [Steam][def2] | ||
- [X post][def3] | ||
|
||
[def]: https://www.techpowerup.com/327060/valve-addresses-rampant-cheaters-in-deadlock-with-unorthodox-frog-anti-cheat-in-latest-update | ||
[def2]: https://forums.playdeadlock.com/threads/09-26-2024-update.33015/ | ||
[def3]: https://x.com/IntelDeadlock/status/1839535097747259804 |