<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Exploitation on Matt Suiche</title><link>https://www.msuiche.com/categories/exploitation/</link><description>Recent content in Exploitation on Matt Suiche</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 20 Jul 2024 12:00:00 +0200</lastBuildDate><atom:link href="https://www.msuiche.com/categories/exploitation/index.xml" rel="self" type="application/rss+xml"/><item><title>Bob and Alice in Kernel-land</title><link>https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/</link><pubDate>Sat, 20 Jul 2024 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/</guid><description>&lt;p&gt;&lt;p class="markdown-image"&gt;
 &lt;img src="./images/main.webp" alt="Blue Screens Everywhere" /&gt;
&lt;/p&gt;&lt;/p&gt;
&lt;p&gt;Already dubbed &amp;ldquo;&lt;a href="https://www.telegraph.co.uk/business/2024/07/19/world-is-horrifying-close-to-total-economic-collapse/" target="_blank" rel="noopener"&gt;The Largest IT&lt;/a&gt;, &lt;a href="https://www.wired.com/story/crowdstrike-outage-update-windows/" target="_blank" rel="noopener"&gt;Outage In History&lt;/a&gt;, the CrowdStrike update from July 18, 2024, has affected at least &lt;a href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/" target="_blank" rel="noopener"&gt;8.5 million Windows devices, according to Microsoft&lt;/a&gt;. Several of these devices are critical assets and run multiple essential services. For instance, I was unable to pay for my coffee in Dubai because the payment systems used by the coffee shop were down, and a friend lost her passport while stranded in Barcelona due to flight disruptions. The full impact and scope of the incident remain unknown, and it is likely be the main topic of discussion at DEFCON and BlackHat this summer and beyond.&lt;/p&gt;</description></item><item><title>Researching Triangulation: Detecting CVE-2023-41990 with single byte signatures.</title><link>https://www.msuiche.com/posts/researching-triangulation-detecting-cve-2023-41990-with-single-byte-signatures./</link><pubDate>Sat, 30 Dec 2023 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/researching-triangulation-detecting-cve-2023-41990-with-single-byte-signatures./</guid><description>&lt;p&gt;As part of the attack chain, the initial infection starts with attackers dispatching a malicious PDF as an iMessage attachment. This particular attachment is crafted to stealthily leverage a remote code execution vulnerability in the FontParser, identified as &lt;a href="https://support.apple.com/en-us/HT213842" target="_blank" rel="noopener"&gt;CVE-2023-41990&lt;/a&gt; and reported by Valentin Pashkov, Mikhail Vinogradov, Georgy Kucherin (@kucher1n), Leonid Bezvershenko (@bzvr_), and Boris Larin (@oct0xor) of Kaspersky to Apple.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;&lt;p lang="en" dir="ltr"&gt;As someone who worked at the NSA, I always think it&amp;#39;s hilarious when people feel like real APTs can be minimized to the MITRE matrix. &lt;a href="https://t.co/BMywfpIS7K"&gt;https://t.co/BMywfpIS7K&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Researching BLASTPASS: Analysing the Apple &amp; Google WebP POC file - Part 2</title><link>https://www.msuiche.com/posts/researching-blastpass-analysing-the-apple-google-webp-poc-file-part-2/</link><pubDate>Sun, 24 Dec 2023 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/researching-blastpass-analysing-the-apple-google-webp-poc-file-part-2/</guid><description>&lt;p&gt;More than 14 weeks pasted since &lt;a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1479274" target="_blank" rel="noopener"&gt;Apple Product Security team reported&lt;/a&gt; the issue affecting WebP open source project to Google, in follow up to the BLASTPASS iOS exploit that was discovered in the wild by &lt;a href="https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/" target="_blank" rel="noopener"&gt;CitizenLab&lt;/a&gt; and &lt;a href="https://www.msuiche.com/posts/researching-blastpass-detecting-the-exploit-inside-a-webp-file/" target="_blank" rel="noopener"&gt;discussed in September&lt;/a&gt;. This means that the email chain is now public as of December 14, 2023.&lt;/p&gt;
&lt;p&gt;We also learn that that Brotli compression algorithm almost got impacted by the &lt;a href="https://chromium.googlesource.com/chromium/src/third_party/&amp;#43;/refs/heads/main/brotli/dec/huffman.c#169" target="_blank" rel="noopener"&gt;same issue&lt;/a&gt; (c.f. &lt;code&gt;BrotliBuildHuffmanTable&lt;/code&gt;) but the shape of Huffman tree is checked before actual lookup table is built so it was not vulnerable.&lt;/p&gt;</description></item></channel></rss>