Latest from CoreLabs

Read blog posts from CoreLabs, the research division of Core Security. CoreLabs prides itself on taking a holistic view of information security with a focus on developing solutions to complex, real-world security problems that affect our customers.

On January 27, 2015, Qualys publicly released a security advisory in glibc’s gethostbyname set of functions, also known as GHOST, which exposes a heap-based buffer overflow affecting a wide range of operating systems and applications using glibc between versions 2.2 and 2.18. CVE-2015-0235…

Read More

At the end of January, Adobe published the security bulletin APSA15-01 for Flash Player, which fixes a critical use-after-free vulnerability affecting Adobe Flash Player 16.0.0.287 and earlier versions. This vulnerability, identified as CVE-2015-0311, allows attackers to execute arbitrary code on vulnerable machines by enticing…

Read More

Occasionally we receive requests to develop Core Impact modules for specific vulnerabilities. Here, I'd like to dive into what that process looked like for CVE-2013-3200, Windows USB vulnerability included in MS13-081 bulletin a.k.a. Windows USB Descriptor Vulnerability. The vulnerability allows physically proximate attackers…

Read More

A great penetration tester always remembers to take physical security into account. With that in mind, we've added an interesting new feature to Core Impact Pro. The module, called “install Agent using Teensy board,” allows Core Impact Pro users to deliver a physical…

Read More

A few weeks ago a critical vulnerability (MS14-068) affecting Windows environments was published by Microsoft (credited to Tom Maddock and team). Specifically, the vulnerability affects Kerberos: [The vulnerability will] allow an attacker to elevate unprivileged domain user account privileges to those of the domain…

Read More

We've released an update to Core Impact Pro that adds a small (but interesting) new feature to one of our most popular modules. Users now have the ability to generate agent payloads that can be customized to specific targets by third party frameworks.…

Read More

We can’t agree on a name, but we can agree it’s a big deal. What is this thing?Many are saying this vulnerability could be bigger than Heartbleed. From my perspective, Heartbleed was a bit more troubling due to the affected component and the massive…

Read More

I've been thinking about the problems that occur when a new vulnerability appears, and how vendors and users react in these situations. In cases where a vulnerability is found in a specific program, the vendor is responsible for finding a fix and distributing the patched…

Read More

We've released a new vulnerability advisory. For those who aren’t familiar with Core Security’s advisories, this research is conducted by CoreLabs in an effort to expose security gaps before adversaries find them. Upon discovering a vulnerability, we work with the affected organization and…

Read More

Hi everyone, I would like to make some comments about the Microsoft MS14-006 update. In the last February Patch Tuesday, Microsoft released a fix for the TCP Windows driver (tcpip.sys). According to the patch bulletin "https://technet.microsoft.com/en-us/security/bulletin/ms14-006" only Windows 8 and Windows 2012 were…

Read More