article thumbnail

Cisco Talos discovered 2 critical flaws in the popular OpenCV library

Security Affairs

Maintainers of the OpenCV library addressed two buffer overflow flaws that could lead to arbitrary code execution. Maintainers of the OpenCV library addressed two high-severity buffer overflow vulnerabilities that could be exploited by an attacker to execute arbitrary code. Both vulnerabilities were reported to the vendor in July 2019.

article thumbnail

Six-Library Vulnerability in NGA

ForAllSecure

The US government has published a software library called six-library designed to parse and manipulate satellite imagery and data for both internal and public use. When examining six-library for potential entry points for fuzzing I kept the following in mind: Look for functions amenable to consuming raw binary data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Six-Library Vulnerability in NGA

ForAllSecure

The US government has published a software library called six-library designed to parse and manipulate satellite imagery and data for both internal and public use. When examining six-library for potential entry points for fuzzing I kept the following in mind: Look for functions amenable to consuming raw binary data.

article thumbnail

How Mayhem Helped Uncover a Security Vulnerability in RustOS (CVE-2022-36086)

ForAllSecure

Earlier this year, I reported a security vulnerability in Rust’s linked-list-allocator to the RustOS Dev team, which was assigned CVE-2022-36086. This library is designed for use in embedded and bootloader contexts, where we don't have the standard library's Vec or Box for dynamic memory. The Target.

article thumbnail

Five benefits of a data catalog

IBM Big Data Hub

Imagine walking into the largest library you’ve ever seen. Fortunately, the library has a computer at the front desk you can use to search its entire inventory by title, author, genre, and more. For example, data catalogs have evolved to deliver governance capabilities like managing data quality and data privacy and compliance.

article thumbnail

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Security Affairs

This is part of a giant list of Living off the Land (LOL) techniques that attackers employ to mask their activities from runtime endpoint security monitoring tools such as AVs. OLE files are hierarchical data structures that have several storages and streams (in contrast to folders and files in an operating system).

article thumbnail

How Ursnif Evolves to Keep Threatening Italy

Security Affairs

This means, the content of the variable “$y” actually is a.NET Dynamic Linked Library. In fact, the decryption key is generated starting from the LCID property of the current “ CultureInfo “, data structure providing information about calendar,language and locale in use on the machine. The Powershell Stage. Pierluigi Paganini.