I am likely going to focus more on what I do outside of work on here rather than be Infosec focused...
Outside of work:
- astrophotography
- hardware hacking
- ham radio
- cars
- guitar
- cats
- potato
While doing so, I caught an ownership transfer of an extension with 400,000 installs that folks should be aware of.
www.secureannex.com/blog/buying-...
While doing so, I caught an ownership transfer of an extension with 400,000 installs that folks should be aware of.
www.secureannex.com/blog/buying-...
I also have yet to see POC.
If you query your hosts/VMs for /tmp/framer.txt and have no findings, don't let the "critical" rating set your teams on fire.
Patch, but breathe.
I also have yet to see POC.
If you query your hosts/VMs for /tmp/framer.txt and have no findings, don't let the "critical" rating set your teams on fire.
Patch, but breathe.
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.
Looks like this got caught by chance. Wonder how long it would have taken otherwise.
www.openwall.com/lists/oss-se...
It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…
Now I’m curious what it does in RSA_public_decrypt
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.
Will the cool kids be going around and saying, "My post went nimbus!"
Will the cool kids be going around and saying, "My post went nimbus!"