Author Archives: Icewall

Microsoft .NET/Silverlight Manifest Resource Information Disclosure Vulnerability [CVE-2015-6114 TALOS-CAN-0130]

:: Description An exploitable information leak or denial of service vulnerability exists in the manifest resource parsing functionality of the .NET Framework. A specially crafted resource can cause an integer overflow resulting in an out of bounds read which may … Continue reading

Posted in Analiza, Bez kategorii, Bugs, Security | Tagged , , , , , | Leave a comment

Microsoft Windows FastFAT.sys Sectors per FAT Denial of Service Vulnerability

Do You remember story about MS14-063 from last year ? It turns out there is continuation of it, but this time inside FAT12 partition. [VIDEO] Time to stick the magic stick Analysis Affected systems From Windows NT to Windows 7 … Continue reading

Posted in Bez kategorii, Bugs, Security | Tagged , , , , , , , | Leave a comment

Story about MS14-063

Last week Microsoft released patch for reported by me vulnerability in FastFat driver marking it as: MS14-063 – Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege (2998579) [CVE-2014-4115]. Let me present some of the most interesting parts … Continue reading

Posted in Bugs, Security | Tagged , , , , | Leave a comment

Fake “Police Trojan” analysis

For some time the “virus of the police” has become an epidemic across Europe. Currently a variant of the first sample, found during summer of 2011, is infecting Windows operating system users. It blocked the system on startup, with a … Continue reading

Posted in Analiza, Malware, RE | Leave a comment

Few vulnerabilities in <= VLC media player 2.0.1 demuxers

After two mails to VLC security team and lack of answer I decided to public this research before any patch. Presented here vulns are not too evil (Local DoS) so making them public will not cause any damage for VLC … Continue reading

Posted in Bugs, Security | Tagged , , , | Leave a comment

BHO Reversing

From a long time for those days (BHO is supported since IE 4.0) malware writers exploit BHO functionality to bully on IE users. Mostly evil BHO has two functionality ( for sure if we talk about bankers): – monitoring/logging requests … Continue reading

Posted in Aplikacja, Malware, RE | Tagged , , , , , , | 6 Comments