article thumbnail

Six-Library Vulnerability in NGA

ForAllSecure

The US government has published a software library called six-library designed to parse and manipulate satellite imagery and data for both internal and public use. In this case the function called before readTre has the user input stream data structure on the stack. This scenario may not be so far-fetched.

article thumbnail

Six-Library Vulnerability in NGA

ForAllSecure

The US government has published a software library called six-library designed to parse and manipulate satellite imagery and data for both internal and public use. In this case the function called before readTre has the user input stream data structure on the stack. This scenario may not be so far-fetched.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Mayhem Helped Uncover a Security Vulnerability in RustOS (CVE-2022-36086)

ForAllSecure

This data structure manages a large, linear array of memory and provides convenient access to smaller, dynamically sized chunks of that memory to callers. The main idea with this harness is to initialize the heap object with a random size, then exercise the other functions at random. Please go read it if you haven't yet!

article thumbnail

Information Governance Challenges and How to Address Them

Gimmal

We can do that both from various repositories and structured data, structured repositories, endpoints and the like. And then in eDiscovery when I jumped over to a company called Recommind back in 2006, and I’ve been primarily in eDiscovery and GRC technology spaces. Gimmal is a company that’s been around for about 15 years now.

article thumbnail

Serverless to the Max: Doing Big Things for Small Dollars with Cloudflare Workers and Azure Functions

Troy Hunt

I've written before about how I made this so fast so I won't go into detail again here (essentially it's a combination of Cloudflare cache, Azure Functions and Blob Storage as the underlying data structure), instead, I want to focus on the real cost of running the thing.