Important memory leak vulnerabilities in F5 firewalls: Patch immediately

Information security specialists reported the detection of two security flaws affecting several firewall models developed by technology firm F5 Networks. According to the report, successful exploitation would allow malicious hackers to deploy severe attack scenarios. Below are brief descriptions of the reported flaws, in addition to their assigned tracking keys and scores according to the […]

Critical memory leak and authorization vulnerability in Bareos, a backup and archiving solution

Information security specialists report the detection of two vulnerabilities in Bareos open-source software to back up, archive and restore files on the main operating systems. According to the report, the successful exploitation of these flaws would allow the deployment of dangerous hacking tasks. Below are brief descriptions of the reported flaws, as well as their […]

How to collect only valid evidence during forensic investigation and incident response processes instead of creating images of system memory

The cybersecurity community understands as cyber forensics the procedures and methodological techniques to identify, collect, preserve, extract, interpret, document and present the evidence of an investigation on a computer system, so that these reports can demonstrate or rule out malicious activity on the affected systems. Specialists say that this research plays a fundamental role in […]

New Wslink Malware Loader Runs as a Server and Executes Modules in Memory

Cybersecurity researchers on Wednesday took the wraps off a “simple yet remarkable” malware loader for malicious Windows binaries targeting Central Europe, North America and the Middle East. Codenamed “Wslink” by ESET, this previously undocumented malware stands apart from the rest in that it runs as a server and executes received modules in memory. There are […]

New Linux kernel memory corruption bug causes full system compromise

Researchers dubbed it a “straightforward Linux kernel locking bug” that they exploited against Debian Buster’s 4.19.0.13-amd64 kernel. In 2017, MacAfee researchers disclosed a memory corruption bug inside the Linux kernel’s UDP fragmentation offload (UFO) that allowed unauthorized individuals to gain local privilege escalation. The bug affected both IPv4 and IPv6 code paths running kernel version 4.8.0 […]

Two critical vulnerabilities in Linux allow hackers to obtain data from kernel memory

Cybersecurity specialists reported the finding of two severe vulnerabilities in Linux-based operating systems that could allow threat actors to bypass the mitigations implemented to prevent Spectre and Meltdown attacks, leading to a kernel memory leak. Tracked as CVE-2020-27170 and CVE-2020-27171, the two flaws received a score of 5.5/10 according to the Common Vulnerability Scoring System […]

Donut – Generates X86, X64, Or AMD64+x86 Position-Independent Shellcode That Loads .NET Assemblies, PE Files, And Other Windows Payloads From Memory

Donut generates x86 or x64 shellcode from VBScript, JScript, EXE, DLL (including .NET Assemblies) files. This shellcode can be injected into an arbitrary Windows processes for in-memory execution. Given a supported file type, parameters and an entry point where applicable (such as Program.Main), it produces position-independent shellcode that loads and runs entirely from memory. A […]

This Newly Proposed Linux Memory Controller To Save Up To 42% RAM

Roman Gushchin, who is part of Facebook’s Linux kernel engineering team, has discovered a “serious flaw” in the way that the current slab memory controller in Linux kernel works. He says (Via The New Stack)that existing kernel design causes low slab utilization and the reason behind it is that the slab pages are used only […]

MemProcFS – The Memory Process File System

  The Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual file system. Easy trivial point and click memory analysis without the need for complicated commandline arguments! Access memory content and artifacts via files in a mounted virtual file system or via a feature rich application […]

Facebook Patches “Memory Disclosure Using JPEG Images” Flaws in HHVM Servers

Facebook has patched two high-severity vulnerabilities in its server application that could have allowed remote attackers to unauthorisedly obtain sensitive information or cause a denial of service just by uploading a maliciously constructed JPEG image file. The vulnerabilities reside in HHVM (HipHop Virtual Machine)—a high-performance, open source virtual machine developed by Facebook for executing programs […]

‘Universal Memory’ Could Be The Perfect Data Storage Device For Your PC

Researchers have developed and patented a new type of computer memory that holds the key to solving the energy crisis that is rising with the progress of digital technology. The new electronic memory device, dubbed as “Universal Memory,” is the perfect storage device that overcomes the limitations of current storage methods with its ultra-low energy […]

RAMBleed attack steals sensitive data from computer memory

“RAMBleed Reading Bits in Memory Without Accessing Them.” A team of security researchers has published a report on a relatively advanced and previously undetected variant of the Rowhammer attack called RAMBleed. Researchers claim that the new variant can be used for reading the contents of the physical memory instead of merely modifying it as it […]

Memory Corruption Zero-Day Bug Found In Windows Notepad App

Security researcher Tavis Ormandy, who is a part of the Google Project Zero team, has already unearthed some serious bugs and threats in the past. This time, he found a new zero-day vulnerability in the Notepad app which affects users of the Windows operating system. The zero-day exploit can be used to open a Windows […]

mXtract – Offensive Memory Extractor & Analyzer

mXtract is an opensource linux based tool that analyzes and dumps memory. It is developed as an offensive pentration testing tool, its primary purpose is to scan memory for private keys, ips, and passwords using regexes. Remember, your results are only as good as your regexes. Why dump directly from memory? In most linux environments […]

Linux 5.1 Might Add Support For Using Persistant Memory As System RAM

There are numerous differences when it comes to traditional RAM and flash storage. While both might be using solid state technologies, RAM is known to be much faster, costly, and speedy. With new solutions like Intel Optane DC Persistent Memory, things are going looking a bit different as it continues to bridge the gaps between non-volatile storage and RAM. […]

SanDisk And Micron Unveil 1TB Memory Cards At MWC 2019

As 5G smartphones are becoming a thing (we have seen a couple of 5G phones at MWC 2019), memory cards with mammoth-sized 1TB of storage are also becoming popular, as SanDisk and Micron have introduced their respective cards at MWC 2019. SanDisk Extreme UHS-I microSDXC Touted as the world’s first 1TB UHS-I microSD, the flash […]