<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Home on STAR Labs</title>
    <link>https://starlabs.sg/</link>
    <description>Recent content in Home on STAR Labs</description>
    <generator>Hugo</generator>
    <language>en-sg</language>
    <lastBuildDate>Wed, 01 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://starlabs.sg/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CHECK Removed, Context Confused, Checkmate Achieved</title>
      <link>https://starlabs.sg/blog/2026/04-check-removed-context-confused-checkmate-achieved/</link>
      <pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2026/04-check-removed-context-confused-checkmate-achieved/</guid>
      <description>&lt;h2 id=&#34;tldr&#34;&gt;TL;DR&lt;/h2&gt;&#xA;&lt;p&gt;In January 2026, the &lt;a href=&#34;https://chromereleases.googleblog.com/2026/01/&#34;&gt;Chrome Releases&lt;/a&gt; blog announced several security fixes across different Chrome components. One entry caught our attention: &lt;strong&gt;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2026-0899&#34;&gt;CVE-2026-0899&lt;/a&gt;&lt;/strong&gt;, an Out-of-Bounds memory access in V8 discovered by &lt;a href=&#34;https://x.com/p1nky4745&#34;&gt;@p1nky4745&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Vulnerabilities in V8, especially OOB and Type Confusions are always interesting from a security research perspective. We decided to take a closer look. At the time of writing, the issue was still restricted and no public proof-of-concept was available. After reverse engineering the patch fix, we identified the root cause of the vulnerability and developed a trigger PoC.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pickling the Mailbox: A Deep Dive into CVE-2025-20393</title>
      <link>https://starlabs.sg/blog/2026/02-pickling-the-mailbox-a-deep-dive-into-cve-2025-20393/</link>
      <pubDate>Thu, 05 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2026/02-pickling-the-mailbox-a-deep-dive-into-cve-2025-20393/</guid>
      <description>&lt;h2 id=&#34;tldr&#34;&gt;TL;DR&lt;/h2&gt;&#xA;&lt;p&gt;In December 2025, Cisco published &lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4&lt;/a&gt; addressing CVE-2025-20393, a critical vulnerability (CVSS 10.0) affecting Cisco Secure Email Gateway and Secure Email and Web Manager. The advisory was notably sparse on technical details, describing only &amp;ldquo;Improper Input Validation&amp;rdquo; (CWE-20).&lt;/p&gt;&#xA;&lt;p&gt;We decided to dig deeper. Through reverse engineering and code analysis of AsyncOS 15.5.3, we uncovered the root cause: a single-byte integer overflow in the EUQ RPC protocol that bypasses authentication and chains into Python pickle deserialization — achieving unauthenticated remote code execution with a single HTTP request.&lt;/p&gt;</description>
    </item>
    <item>
      <title>8th Anniversary: Embrace the new but don&#39;t forget the old</title>
      <link>https://starlabs.sg/blog/2026/01-8th-anniversary-embrace-the-new-but-dont-forget-the-old/</link>
      <pubDate>Thu, 08 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2026/01-8th-anniversary-embrace-the-new-but-dont-forget-the-old/</guid>
      <description>&lt;p&gt;Eight years ago today, I started STAR Labs by hiring several fresh grads with no working experiences.&lt;/p&gt;&#xA;&lt;p&gt;Today, I stand here with a different group of faces. Some of you were there from the beginning. Some of you joined along the way. Some of you just started last month.&lt;/p&gt;&#xA;&lt;p&gt;And some of the people who were here&amp;hellip; weren&amp;rsquo;t anymore.&lt;/p&gt;&#xA;&lt;p&gt;Not because they failed. Not because we failed them. But because life called them in different directions.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2025: WE BROKE THINGS, WE BUILT THINGS, WE BROKE EVEN MORE THINGS</title>
      <link>https://starlabs.sg/blog/2025/12-2025-we-broke-things-we-built-things-we-broke-even-more-things/</link>
      <pubDate>Sat, 27 Dec 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/12-2025-we-broke-things-we-built-things-we-broke-even-more-things/</guid>
      <description>&lt;p&gt;Most will talk about the success in their year-end posts. Great. Nobody talks about the failures. Nobody talks about what ACTUALLY happened.&lt;/p&gt;&#xA;&lt;p&gt;Well, we are going to tell you about OUR STORY - the success AND the failures. The whole thing. Because that&amp;rsquo;s how we actually learn&amp;hellip;from our own mistakes.&lt;/p&gt;&#xA;&lt;p&gt;So here it is, UNFILTERED. Buckle up.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;pwn2own-2025-berlin--ireland&#34;&gt;PWN2OWN 2025 BERLIN &amp;amp; IRELAND&lt;/h2&gt;&#xA;&lt;p&gt;We could only bring one of our interns, Gerrard Tai, along with us to Pwn2Own. Not to watch from the sidelines, but to COMPETE. He was right there with us, building exploit chains, debugging our team members&amp;rsquo; codes while under pressure and experiencing the absolute rush of pwning devices on the world stage.&lt;/p&gt;</description>
    </item>
    <item>
      <title>AI Accelerated Exploiting: Compromising MTE Enabled Pixel from DSP Coprocessor</title>
      <link>https://starlabs.sg/publications/ai-accelerated-exploiting-compromising-mte-enabled-pixel-from-dsp-coprocessor/</link>
      <pubDate>Tue, 18 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/ai-accelerated-exploiting-compromising-mte-enabled-pixel-from-dsp-coprocessor/</guid>
      <description>&lt;p&gt;Talk delivered at CODE BLUE 2025 (Tokyo, November 2025).&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/CodeBlue%202025/AI%20Accelerated%20Exploiting_%20Compromising%20MTE%20Enabled%20Pixel%20from%20DSP%20Coprocessor.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dancing with Exynos Coprocessor: Pwning Samsung for Fun and &#34;Profit&#34;</title>
      <link>https://starlabs.sg/publications/dancing-with-exynos-coprocessor-pwning-samsung-for-fun-and-profit/</link>
      <pubDate>Tue, 18 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/dancing-with-exynos-coprocessor-pwning-samsung-for-fun-and-profit/</guid>
      <description>&lt;p&gt;Talk delivered at CODE BLUE 2025 (Tokyo, November 2025).&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/CodeBlue%202025/Dancing%20with%20Exynos%20Coprocessor_%20Pwning%20Samsung%20for%20fun%20and%20profit.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HEX ADVENT 2025: Crack the Advent, Conquer the Threat 🐛</title>
      <link>https://starlabs.sg/blog/2025/11-hex-advent-2025-crack-the-advent-conquer-the-threat/</link>
      <pubDate>Tue, 18 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/11-hex-advent-2025-crack-the-advent-conquer-the-threat/</guid>
      <description>&lt;h1 id=&#34;hex-advent-2025-crack-the-advent-conquer-the-threat-&#34;&gt;HEX ADVENT 2025: Crack the Advent, Conquer the Threat 🐛&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;Last chance to register! Registration closing on 20 Dec 2025, 09:00 SGT!&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;WELCOME TO HEX ADVENT 2025&lt;/strong&gt;, ‘tis the season to &lt;strong&gt;Unwrap Your Potential! 🎁&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;HEX ADVENT 2025 is a Christmas-themed CTF Advent Calendar, &lt;strong&gt;designed for women, by women&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-to-expect&#34;&gt;What to Expect&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;12 Days, 12 Challenges&lt;/strong&gt;: A structured schedule to build mastery across different CTF categories.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Focus Areas&lt;/strong&gt;:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Pwn (Binary Exploitation)&lt;/li&gt;&#xA;&lt;li&gt;Cryptography&lt;/li&gt;&#xA;&lt;li&gt;Reverse Engineering&lt;/li&gt;&#xA;&lt;li&gt;Forensics&lt;/li&gt;&#xA;&lt;li&gt;OSINT&lt;/li&gt;&#xA;&lt;li&gt;Web Exploitation&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Our Mission&lt;/strong&gt;: To empower women in cybersecurity, create visible role models, and cultivate a robust local talent pool.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Date&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;What To Expect?&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;1 to 12 Dec 2025&lt;/td&gt;&#xA;          &lt;td&gt;New challenges unlocked at &lt;strong&gt;09:00 SGT&lt;/strong&gt; daily&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;1 to 31 Dec 2025&lt;/td&gt;&#xA;          &lt;td&gt;Challenges open until &lt;strong&gt;31 Dec 2025, 23:59 SGT&lt;/strong&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;1 Dec 2025 to 5 Jan 2026&lt;/td&gt;&#xA;          &lt;td&gt;Write-up submissions will close on &lt;strong&gt;5 Jan 2026, 23:59 SGT&lt;/strong&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;p&gt;✍🏻➡️ &lt;a href=&#34;https://hex-advent.starlabs.sg/&#34;&gt;&lt;strong&gt;REGISTER&lt;/strong&gt;&lt;/a&gt; TO PLAY NOW&lt;/p&gt;</description>
    </item>
    <item>
      <title>HEX ADVENT 2025: Rules &amp; Information</title>
      <link>https://starlabs.sg/blog/2025/11-hex-advent-2025-rules-information/</link>
      <pubDate>Mon, 10 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/11-hex-advent-2025-rules-information/</guid>
      <description>&lt;h2 id=&#34;information&#34;&gt;&lt;strong&gt;Information&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;This is a solo CTF event open to women residing in Singapore or Malaysia.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;To register and be eligible for the prizes:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Register on &lt;a href=&#34;https://hex-advent.starlabs.sg/&#34;&gt;CTFd&lt;/a&gt;, and select the &lt;strong&gt;&amp;ldquo;eligible&amp;rdquo;&lt;/strong&gt; bracket.&lt;/li&gt;&#xA;&lt;li&gt;Confirm your eligibility by filling in the &lt;a href=&#34;https://forms.gle/eFHFebXVNTfRZusW6&#34;&gt;Google Form&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;The flag format is described by this regex: /^HEX{.*}$/&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;There are a total of 12 challenges. One challenge will be released each day at 09:00 SGT within the period of 1 December 2025 to 12 December 2025. All challenges will be announced on the STAR Labs blog, and the challenges can be accessed through the CTFd platform within the period of 1 December 2025, 09:00 SGT to 31 December 2025, 23:59 SGT.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer</title>
      <link>https://starlabs.sg/blog/2025/11-breaking-into-a-brother-mfc-j1010dw-three-security-flaws-in-a-seemingly-innocent-printer/</link>
      <pubDate>Mon, 03 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/11-breaking-into-a-brother-mfc-j1010dw-three-security-flaws-in-a-seemingly-innocent-printer/</guid>
      <description>&lt;h2 id=&#34;the-target-brother-mfc-j1010dw&#34;&gt;The Target: Brother MFC-J1010DW&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Affected Models: &lt;code&gt;Brother Printer MFC-J1010DW&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Vulnerable Firmware: &lt;code&gt;Version &amp;lt;= 1.18&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;tldr-the-vulnerability-chain&#34;&gt;TL;DR: The Vulnerability Chain&lt;/h2&gt;&#xA;&lt;p&gt;We discovered three vulnerabilities that when chained together, allow for complete remote compromise:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Authentication Bypass via SNMP&lt;/strong&gt; - Retrieve the printer&amp;rsquo;s serial number without authentication, allowing attackers to derive the default admin password&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Unauthenticated Firmware Rollback&lt;/strong&gt; - Downgrade to vulnerable firmware versions over the network, no credentials required&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Buffer Overflow via Referer Header&lt;/strong&gt; - Execute arbitrary code by crafting malicious HTTP headers&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;The result? We made the printer display our chosen message of &lt;strong&gt;&amp;ldquo;STAR LABS!&amp;rdquo;&lt;/strong&gt; on its screen—but this is just a proof of concept. A real attacker could do much worse.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Ireland 2025</title>
      <link>https://starlabs.sg/achievements/pwn2own-ireland-2025/</link>
      <pubDate>Thu, 23 Oct 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-ireland-2025/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2025/7/30/pwn2own-returns-to-ireland-with-a-one-million-dollar-whatsapp-target&#34;&gt;2025 Autumn edition of Pwn2Own (Pwn2Own Ireland)&lt;/a&gt; was held from 21st October to 23rd October 2025 in an on-site format where participants competed in-person.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-55336) Windows Cloud Files Mini Filter Driver Information Disclosure</title>
      <link>https://starlabs.sg/advisories/25/25-55336/</link>
      <pubDate>Tue, 14 Oct 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-55336/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-55336&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Windows 10 (21H2, 22H2, 1809), Windows 11 (22H2, 23H2, 24H2, 25H2), Windows Server 2019, 2022, 2022 23H2, 2025&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 5.5 (Medium) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Windows Cloud Files Mini Filter Driver (&lt;code&gt;cldflt.sys&lt;/code&gt;)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium — an unprivileged local attacker may exploit this to leak kernel addresses&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 10 (21H2, 22H2, 1809), Windows 11 (22H2, 23H2, 24H2, 25H2), Windows Server 2019 / 2022 / 2022 23H2 / 2025&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 11 24H2 (Build 26100.2161)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-55336&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A side channel in the Windows Cloud Files Mini Filter Driver allows an unprivileged local attacker to leak the &lt;code&gt;EPROCESS&lt;/code&gt; kernel address of the current process&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-200: Exposure of Sensitive Information to an Unauthorized Actor&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 5.5 (Medium)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Summer Pwnables: lz1 Solution</title>
      <link>https://starlabs.sg/blog/2025/09-summer-pwnables-lz1-solution/</link>
      <pubDate>Mon, 15 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/09-summer-pwnables-lz1-solution/</guid>
      <description>&lt;h2 id=&#34;tldr-&#34;&gt;TL;DR 🚀&lt;/h2&gt;&#xA;&lt;p&gt;We&amp;rsquo;re turning a simple compression library into a shell delivery service! This writeup exploits a buffer overflow in lz1/lz77 decompression by crafting malicious compressed data that overflows the stack and chains ROP gadgets for code execution.&#xA;Ever wondered how a simple file compression tool could hand you the keys to a system? Well, buckle up because we&amp;rsquo;re about to turn andyherbert&amp;rsquo;s innocent &lt;a href=&#34;https://github.com/andyherbert/lz1&#34;&gt;lz1 compressor&lt;/a&gt; into our personal shell delivery service! 🎭&lt;/p&gt;</description>
    </item>
    <item>
      <title>Summer Pwnables: Temporal Paradox Engine Solution</title>
      <link>https://starlabs.sg/blog/2025/09-summer-pwnables-temporal-paradox-engine-solution/</link>
      <pubDate>Mon, 15 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/09-summer-pwnables-temporal-paradox-engine-solution/</guid>
      <description>&lt;p&gt;Last month, Jacob asked me to create a CTF challenge for the Summer Pwnables event. I went with a kernel pwnable since my goal was to teach students some more advanced Linux kernel exploitation techniques - something that wouldn&amp;rsquo;t get solved in a day (and hopefully not by AI either).&lt;/p&gt;&#xA;&lt;p&gt;After building both the challenge and solution, I figured students should be able to crack it within 3-7 days. Turns out I was right about the timeline, but only one person actually solved it. &lt;a href=&#34;https://www.linkedin.com/in/jro-sg/&#34;&gt;Jun Rong Lam&lt;/a&gt;, he is the first solver by solving this challenge in a week. The next week &lt;a href=&#34;https://www.linkedin.com/in/lucas-tan-yi-jie/&#34;&gt;Lucas Tan Yi Je&lt;/a&gt; solved it. In third week, &lt;a href=&#34;https://www.linkedin.com/in/elijah-chia&#34;&gt;Elijah Chia&lt;/a&gt; solved this challenge, so 3 weeks in total. I really amaze by these students skills and persistence.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lost in Translation: Apache Vulnerabilities That Don&#39;t Count (Literally)</title>
      <link>https://starlabs.sg/blog/2025/09-lost-in-translation-apache-vulnerabilities-that-dont-count-literally/</link>
      <pubDate>Thu, 11 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/09-lost-in-translation-apache-vulnerabilities-that-dont-count-literally/</guid>
      <description>&lt;p&gt;During our security research in 2024, we discovered several vulnerabilities in Apache Foundation projects that seem to have gotten &amp;rsquo;lost in translation&amp;rsquo; between our bug reports and the CVE assignment process. While we&amp;rsquo;ve been patiently waiting for these findings to officially &amp;lsquo;count,&amp;rsquo; they&amp;rsquo;ve apparently been stuck longer than a software update on a Friday afternoon. Almost a year went by without any CVEs assigned and which we completely forgot about until now. So we figured it was time to let these vulnerabilities see the light of day, even if they&amp;rsquo;re destined to remain the security world&amp;rsquo;s &amp;lsquo;ones that got away.&amp;rsquo; The following vulnerabilities were responsibly disclosed to Apache and have been addressed, though they continue to exist in that special category of bugs that are real enough to fix but without CVEs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-54098) Windows Hyper-V vhdmp.sys Arbitrary File Write Leading to Elevation of Privilege</title>
      <link>https://starlabs.sg/advisories/25/25-54098/</link>
      <pubDate>Tue, 09 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-54098/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-54098&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Windows 10 (1507, 1607, 1809, 21H2, 22H2); Windows 11 (22H2, 23H2, 24H2); Windows Server 2008 R2 SP1 through 2025&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Windows Hyper-V (&lt;code&gt;vhdmp.sys&lt;/code&gt;)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local unprivileged attacker may write arbitrary data to any file on the system&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 10 (1507, 1607, 1809, 21H2, 22H2); Windows 11 (22H2, 23H2, 24H2); Windows Server 2008 R2 SP1 – 2025&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 11 24H2 (Build 26100.4061)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-54098&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-284: Improper Access Control&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-39682) Linux Kernel net/tls Use-After-Free in tls_sw_recvmsg Leading to Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/25/25-39682/</link>
      <pubDate>Fri, 05 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-39682/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-39682&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Linux kernel 6.0 through 6.1.148; 6.2 through 6.6.102; 6.7 through 6.12.43; 6.13 through 6.16.3; 6.17-rc1 and 6.17-rc2&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.1 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Linux Kernel (&lt;code&gt;net/tls&lt;/code&gt;)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local unprivileged attacker may exploit the vulnerability to elevate privileges to root&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux 6.0–6.1.148; 6.2–6.6.102; 6.7–6.12.43; 6.13–6.16.3; 6.17-rc1 and 6.17-rc2&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux 6.12.41&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-39682&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A use-after-free vulnerability in the Linux kernel net/tls can be exploited to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-416: Use After Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.1 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fuzzing a Printer: Pre-auth RCE in a Network IoT Device</title>
      <link>https://starlabs.sg/blog/2025/09-fuzzing-a-printer-pre-auth-rce-in-a-network-iot-device/</link>
      <pubDate>Tue, 02 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/09-fuzzing-a-printer-pre-auth-rce-in-a-network-iot-device/</guid>
      <description>&lt;p&gt;Printers have three things going for them from an attacker&amp;rsquo;s perspective: they live on the corporate network, they trust far too much from far too many protocols, and nobody patches them. Over the last quarter we&amp;rsquo;ve been building out a fuzzing harness for enterprise MFPs.&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-harness&#34;&gt;The harness&lt;/h2&gt;&#xA;&lt;p&gt;We emulate the device&amp;rsquo;s firmware in a QEMU-based sandbox with a hooked network stack, then let AFL++ drive crafted PJL, SNMP, and IPP messages into the exposed listeners. The hard part isn&amp;rsquo;t the fuzzer. It&amp;rsquo;s the harness getting realistic enough that findings translate to the physical device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>[Updates] Summer Pwnables 🔥</title>
      <link>https://starlabs.sg/blog/2025/08-updates-summer-pwnables/</link>
      <pubDate>Mon, 18 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/08-updates-summer-pwnables/</guid>
      <description>&lt;h1 id=&#34;updates-summer-pwnables-2025&#34;&gt;[Updates] Summer Pwnables 2025&lt;/h1&gt;&#xA;&lt;h2 id=&#34;major-announcement-isd-sponsorship&#34;&gt;Major Announcement: ISD Sponsorship&lt;/h2&gt;&#xA;&lt;p&gt;We are pleased to announce that &lt;strong&gt;&lt;a href=&#34;https://www.mha.gov.sg/isd&#34;&gt;Internal Security Department (ISD)&lt;/a&gt;&lt;/strong&gt; is sponsoring Summer Pwnables Challenge #0002 Challenge #003.&lt;/p&gt;&#xA;&lt;h2 id=&#34;distribution-rule&#34;&gt;Distribution Rule&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Challenge #002 and #003 are meant for Singaporean students.&lt;/li&gt;&#xA;&lt;li&gt;Each Singaporean student can only win &lt;strong&gt;once&lt;/strong&gt; across all challenges to ensure broader community recognition. However, they can still submit their solutions in order to win the new &amp;ldquo;Grand Prize&amp;rdquo;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Prizes&lt;/strong&gt; are still $100 SGD + the &amp;ldquo;From Day Zero to Zero Day&amp;rdquo; book written by &lt;a href=&#34;https://www.linkedin.com/in/eugene1337/&#34;&gt;Eugene &amp;ldquo;Spaceraccoon&amp;rdquo; Lim&lt;/a&gt; for the first five solvers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cracking the Pixel 8: Exploiting the Undocumented DSP to Bypass MTE</title>
      <link>https://starlabs.sg/publications/cracking-the-pixel-8-exploiting-the-undocumented-dsp-to-bypass-mte/</link>
      <pubDate>Fri, 15 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/cracking-the-pixel-8-exploiting-the-undocumented-dsp-to-bypass-mte/</guid>
      <description>&lt;p&gt;Talk delivered at HITCON 2025 (Taipei, August 2025).&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/HITCON%202025/Cracking%20the%20Pixel%208_%20Exploiting%20the%20Undocumented%20DSP%20to%20Bypass%20MTE.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-50170) Windows Cloud Files Mini Filter Driver Elevation of Privilege</title>
      <link>https://starlabs.sg/advisories/25/25-50170/</link>
      <pubDate>Tue, 12 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-50170/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-50170&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Windows 10 (1809, 21H2, 22H2), Windows 11 (22H2, 23H2, 24H2), Windows Server 2019, 2022, 2025&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Windows Cloud Files Mini Filter Driver (&lt;code&gt;cldflt.sys&lt;/code&gt;)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — an unprivileged local attacker may corrupt arbitrary files to achieve code execution as SYSTEM&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 10 (1809, 21H2, 22H2), Windows 11 (22H2, 23H2, 24H2), Windows Server 2019 / 2022 / 2025&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 11 23H2 (Build 22631.4249)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-50170&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A logic error in the Windows Cloud Files Mini Filter Driver allows an unprivileged local attacker to corrupt arbitrary files and execute code as SYSTEM&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-280: Improper Handling of Insufficient Permissions or Privileges&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Summer Pwnables: When the Heat Rises, So Do the C-Shells 🔥</title>
      <link>https://starlabs.sg/blog/2025/08-summer-pwnables-when-the-heat-rises-so-do-the-c-shells/</link>
      <pubDate>Tue, 12 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/08-summer-pwnables-when-the-heat-rises-so-do-the-c-shells/</guid>
      <description>&lt;h1 id=&#34;-summer-pwnables-2025-&#34;&gt;🌴☀️ &lt;strong&gt;SUMMER PWNABLES 2025&lt;/strong&gt; ☀️🌴&lt;/h1&gt;&#xA;&lt;h2 id=&#34;the-hottest-hacking-challenge-on-this-side-of-southeast-asia&#34;&gt;&lt;em&gt;The hottest hacking challenge on this side of Southeast Asia!&lt;/em&gt;&lt;/h2&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/blog/2025/images/landscape%20size%20challenge%20poster%20v2.jpg&#34; alt=&#34;Summer Pwnables Poster&#34;&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;&lt;strong&gt;Think you can handle the heat? Time to prove your l33t skills are more than just talk!&lt;/strong&gt; 😎🔥&lt;/p&gt;&#xA;&lt;p&gt;The summer sun isn&amp;rsquo;t the only thing burning bright – we have cooked up some &lt;strong&gt;seriously spicy&lt;/strong&gt; challenges that will test whether you are a true shell wizard! 🧙‍♂️✨&lt;/p&gt;&#xA;&lt;h3 id=&#34;-eligibility-requirements&#34;&gt;📍 &lt;strong&gt;ELIGIBILITY REQUIREMENTS&lt;/strong&gt;&lt;/h3&gt;&#xA;&lt;p&gt;&lt;strong&gt;This challenge is exclusively open to Singapore-based students only!&lt;/strong&gt;&lt;br&gt;&#xA;&lt;em&gt;You must be currently enrolled in a Singapore educational institution to participate.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>My `Blind Date` with CVE-2025-29824</title>
      <link>https://starlabs.sg/blog/2025/07-my-blind-date-with-cve-2025-29824/</link>
      <pubDate>Wed, 16 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/07-my-blind-date-with-cve-2025-29824/</guid>
      <description>&lt;p&gt;In April 2025, Microsoft patched a vulnerability that had become a key component in sophisticated ransomware attack chains. &lt;code&gt;CVE-2025-29824&lt;/code&gt;, an use-after-free bug in the Windows Common Log File System (CLFS) driver, wasn&amp;rsquo;t the initial entry point for attackers. Instead, &lt;a href=&#34;https://www.security.com/threat-intelligence/play-ransomware-zero-day&#34;&gt;threat actors first compromised Cisco ASA firewalls&lt;/a&gt;, then used this Windows kernel vulnerability as the crucial privilege escalation step that transformed limited network access into complete system domination. This multi-stage approach represents the evolution of modern ransomware operations: sophisticated threat actors chaining together network infrastructure vulnerabilities with Windows kernel bugs to devastating effect.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fooling the Sandbox: A Chrome-atic Escape</title>
      <link>https://starlabs.sg/blog/2025/07-fooling-the-sandbox-a-chrome-atic-escape/</link>
      <pubDate>Thu, 10 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/07-fooling-the-sandbox-a-chrome-atic-escape/</guid>
      <description>&lt;p&gt;For my internship, I was tasked by my mentor Le Qi to analyze CVE-2024-30088, a double-fetch race condition bug in the Windows Kernel Image &lt;code&gt;ntoskrnl.exe&lt;/code&gt;. A public POC demonstrating EoP from Medium Integrity Level to SYSTEM is available on GitHub &lt;a href=&#34;https://github.com/tykawaii98/CVE-2024-30088&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Additionally, I was challenged (more like forced 💀) to chain the exploit to escape the Chrome Renderer Sandbox, achieving EoP from Untrusted Integrity Level to SYSTEM.&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;Easy, right?&lt;/em&gt; 🤡&lt;/p&gt;&#xA;&lt;p&gt;Note: CVE-2024-30088 came out &lt;a href=&#34;https://windows-internals.com/kaslr-leaks-restriction/&#34;&gt;before 24H2&lt;/a&gt;, so I analyzed it using a 23H2 Windows VM instead&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-47985) Windows Event Tracing Insufficient Validation Leading to Elevation of Privilege</title>
      <link>https://starlabs.sg/advisories/25/25-47985/</link>
      <pubDate>Tue, 08 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-47985/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-47985&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Windows 11&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Windows Event Tracing (ETW)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local attacker may exploit this to elevate privileges to SYSTEM&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 11&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 11 23H2 (Build 22631.4660)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-47985&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Insufficient validation in Event Tracing for Windows (ETW) in Microsoft Windows 11 may allow an unprivileged attacker to execute code as SYSTEM&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-125: Out-of-Bounds Read&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-49660) Windows Event Tracing Reference Count Overflow Leading to Use-After-Free and Elevation of Privilege</title>
      <link>https://starlabs.sg/advisories/25/25-49660/</link>
      <pubDate>Tue, 08 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-49660/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-49660&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Windows 11&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Windows Event Tracing (ETW)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local attacker may exploit this to elevate privileges to SYSTEM&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 11&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 11 23H2 (Build 22631.4660)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-49660&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Insufficient checks in Event Tracing for Windows (ETW) in Microsoft Windows 11 may allow an unprivileged attacker to execute code as SYSTEM&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-190: Integer Overflow or Wraparound; CWE-416: Use After Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Solo: A Pixel 6 Pro Story (When one bug is all you need)</title>
      <link>https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/</link>
      <pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/</guid>
      <description>&lt;p&gt;During my internship I was tasked to analyze a &lt;a href=&#34;https://github.com/0x36/Pixel_GPU_Exploit&#34;&gt;Mali GPU exploit&lt;/a&gt; on Pixel 7/8 devices and adapt it to make it work on another device: the Pixel 6 Pro.&lt;/p&gt;&#xA;&lt;p&gt;While the exploit process itself is relatively straightforward to reproduce (in theory we just need to find the correct symbol offsets and signatures for our target device), what&amp;rsquo;s interesting about Pixel 6 Pro is that &lt;a href=&#34;https://github.com/0x36/Pixel_GPU_Exploit/issues/6&#34;&gt;it uses a different Mali GPU from the Pixel 7/8&lt;/a&gt;, which lacked support for a feature that one of the two vulnerabilities within the exploit relied on:&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-23095) Samsung Exynos NPU Driver Double Free Leading to Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/25/25-23095/</link>
      <pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-23095/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-23095&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Samsung Galaxy S24+ (&lt;code&gt;samsung/e2sxxx/e2s:14/UP1A.231005.007/S926BXXS3AXGD:user/release-keys&lt;/code&gt;); Samsung Exynos 1280, 2200, 1380, 1480, 2400&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Samsung Exynos NPU Driver&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local attacker within &lt;code&gt;untrusted_app&lt;/code&gt; SELinux context may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (Android 14); Exynos 1280, 2200, 1380, 1480, 2400&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (&lt;code&gt;S926BXXS3AXGD&lt;/code&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-23095&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A double free in the Samsung Exynos mobile processor NPU driver leads to privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-415: Double Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-23099) Samsung Exynos NPU Driver Out-of-Bounds Write Leading to Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/25/25-23099/</link>
      <pubDate>Mon, 02 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-23099/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-23099&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Samsung Galaxy S24+ (&lt;code&gt;samsung/e2sxxx/e2s:14/UP1A.231005.007/S926BXXS3AXGD:user/release-keys&lt;/code&gt;); Samsung Exynos 1480, 2400&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Samsung Exynos NPU Driver&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local attacker within &lt;code&gt;untrusted_app&lt;/code&gt; SELinux context may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (Android 14); Exynos 1480, 2400&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (&lt;code&gt;S926BXXS3AXGD&lt;/code&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-23099&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A missing length check in the Samsung Exynos NPU driver leads to out-of-bounds writes, exploitable for local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-787: Out-of-Bounds Write&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-23096) Samsung Exynos NPU Driver Double Free in IMB Memory Buffer Leading to Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/25/25-23096/</link>
      <pubDate>Sun, 01 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-23096/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-23096&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Samsung Galaxy S24+ (&lt;code&gt;samsung/e2sxxx/e2s:14/UP1A.231005.007/S926BXXS3AXGD:user/release-keys&lt;/code&gt;); Samsung Exynos 1280, 2200, 1380, 1480, 2400&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Samsung Exynos NPU Driver&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local attacker within &lt;code&gt;untrusted_app&lt;/code&gt; SELinux context may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (Android 14); Exynos 1280, 2200, 1380, 1480, 2400&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (&lt;code&gt;S926BXXS3AXGD&lt;/code&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-23096&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A double free in the Samsung Exynos mobile processor NPU driver leads to privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-415: Double Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-23098) Samsung Exynos NPU Driver Use-After-Free in IMB Memory Buffer Leading to Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/25/25-23098/</link>
      <pubDate>Sun, 01 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-23098/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-23098&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Samsung Galaxy S24+ (&lt;code&gt;samsung/e2sxxx/e2s:14/UP1A.231005.007/S926BXXS3AXGD:user/release-keys&lt;/code&gt;); Samsung Exynos 980, 990, 1080, 2100, 1280, 2200, 1380&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Samsung Exynos NPU Driver&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local attacker within &lt;code&gt;untrusted_app&lt;/code&gt; SELinux context may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (Android 14); Exynos 980, 990, 1080, 2100, 1280, 2200, 1380&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (&lt;code&gt;S926BXXS3AXGD&lt;/code&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-23098&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A use-after-free in the Samsung Exynos mobile processor NPU driver leads to privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-416: Use After Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-23100) Samsung Exynos NPU Driver Null Pointer Dereference Leading to Denial of Service</title>
      <link>https://starlabs.sg/advisories/25/25-23100/</link>
      <pubDate>Sun, 01 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-23100/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-23100&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Samsung Galaxy S24+ (&lt;code&gt;samsung/e2sxxx/e2s:16/BP2A.250605.031.A3/S926BXXU9CYI5:user/release-keys&lt;/code&gt;); Samsung Exynos 1280, 2200, 1380, 1480, 2400&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 5.5 (Medium) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Samsung Exynos NPU Driver&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium — a local attacker within &lt;code&gt;untrusted_app&lt;/code&gt; SELinux context may exploit this to cause denial of service&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (Android 16); Exynos 1280, 2200, 1380, 1480, 2400&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (&lt;code&gt;S926BXXU9CYI5&lt;/code&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-23100&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;The absence of a null check in the Samsung Exynos NPU driver leads to a denial of service&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-476: NULL Pointer Dereference&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 5.5 (Medium)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-23103) Samsung Exynos NPU Driver Out-of-Bounds Write via Unbounded Loop Counter</title>
      <link>https://starlabs.sg/advisories/25/25-23103/</link>
      <pubDate>Sun, 01 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-23103/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-23103&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Samsung Galaxy S24+ (&lt;code&gt;samsung/e2sxxx/e2s:14/UP1A.231005.007/S926BXXS3AXGD:user/release-keys&lt;/code&gt;); Samsung Exynos 1480, 2400&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Samsung Exynos NPU Driver&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local attacker within &lt;code&gt;untrusted_app&lt;/code&gt; SELinux context may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (Android 14); Exynos 1480, 2400&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (&lt;code&gt;S926BXXS3AXGD&lt;/code&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-23103&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A missing length check in the Samsung Exynos NPU driver leads to out-of-bounds writes, exploitable for local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-787: Out-of-Bounds Write&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-23107) Samsung Exynos NPU Driver Out-of-Bounds Write via Undersized User Buffer</title>
      <link>https://starlabs.sg/advisories/25/25-23107/</link>
      <pubDate>Sun, 01 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-23107/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-23107&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Samsung Galaxy S24+ (&lt;code&gt;samsung/e2sxxx/e2s:14/UP1A.231005.007/S926BXXS3AXGD:user/release-keys&lt;/code&gt;); Samsung Exynos 1480, 2400&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Samsung Exynos NPU Driver&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local attacker within &lt;code&gt;untrusted_app&lt;/code&gt; SELinux context may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (Android 14); Exynos 1480, 2400&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S24+ (&lt;code&gt;S926BXXS3AXGD&lt;/code&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-23107&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A missing length check in the Samsung Exynos NPU driver leads to out-of-bounds writes, exploitable for local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-787: Out-of-Bounds Write&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Gone in 5 Seconds: How WARN_ON Stole 10 Minutes</title>
      <link>https://starlabs.sg/blog/2025/05-gone-in-5-seconds-how-warn_on-stole-10-minutes/</link>
      <pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/05-gone-in-5-seconds-how-warn_on-stole-10-minutes/</guid>
      <description>&lt;p&gt;As part of my internship at STAR Labs, I was tasked to conduct N-day analysis of CVE-2023-6241. The original PoC can be found &lt;a href=&#34;https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE_2023_6241&#34;&gt;here&lt;/a&gt;, along with the accompanying &lt;a href=&#34;https://github.blog/security/vulnerability-research/gaining-kernel-code-execution-on-an-mte-enabled-pixel-8/&#34;&gt;write-up&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;In this blog post, I will explain the root cause as well as an alternative exploitation technique used to exploit the page UAF, achieving arbitrary kernel code execution.&lt;/p&gt;&#xA;&lt;p&gt;The following exploit was tested on a Pixel 8 running the latest version available prior to the patch.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Badge &amp; Lanyard Challenges @ OBO 2025</title>
      <link>https://starlabs.sg/blog/2025/05-badge-lanyard-challenges-@-obo-2025/</link>
      <pubDate>Wed, 28 May 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/05-badge-lanyard-challenges-@-obo-2025/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;We are back with Round 2 of the Off-By-One conference — where bits meet breadboards and bugs are celebrated! 🐛⚡&lt;/p&gt;&#xA;&lt;p&gt;If you are into hardware and IoT security, you&amp;rsquo;ll know one thing&amp;rsquo;s for sure: the STAR Labs SG badge is not your average conference bling bling. This year&amp;rsquo;s badge isn&amp;rsquo;t just a collector&amp;rsquo;s item — it&amp;rsquo;s a playground for the curious, packed with new challenges inspired by months&amp;rsquo;s worth of research and hackery. And yes, the CTF is back, with even more nerdy goodness.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lessons From Pwn2Own Berlin 2025: Building a Hypervisor Escape</title>
      <link>https://starlabs.sg/blog/2025/05-lessons-from-pwn2own-berlin-2025-building-a-hypervisor-escape/</link>
      <pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/05-lessons-from-pwn2own-berlin-2025-building-a-hypervisor-escape/</guid>
      <description>&lt;p&gt;At Pwn2Own Berlin 2025, STAR Labs took home Master of Pwn for a chain that escaped a major hypervisor from inside a guest VM. This is the short version of how we got there. Longer write-up to follow after all patches are deployed.&lt;/p&gt;&#xA;&lt;h2 id=&#34;target-selection&#34;&gt;Target selection&lt;/h2&gt;&#xA;&lt;p&gt;We started with three candidate attack surfaces: the device-emulation path, the virtio back-ends, and the nested-virtualization code path. We picked device emulation because it sees the most attacker-controlled input per unit of code, and because prior research suggested the maintainers had been less aggressive about fuzzing it than the core dispatcher.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Berlin 2025: Master of Pwn</title>
      <link>https://starlabs.sg/achievements/pwn2own-berlin-2025-master-of-pwn/</link>
      <pubDate>Sat, 17 May 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-berlin-2025-master-of-pwn/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2025/2/24/announcing-pwn2own-berlin-2025&#34;&gt;2025 spring edition of Pwn2Own (Pwn2Own Berlin)&lt;/a&gt; was held from 15th May to 17th May 2025 in an on-site format where participants competed in-person.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-37890) Linux Kernel net_sched netem Double Enqueue Leading to Use-After-Free and Local Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/25/25-37890/</link>
      <pubDate>Fri, 16 May 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-37890/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-37890&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Linux kernel 5.0.1 through 6.15-rc4&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Linux Kernel (net_sched)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux Kernel&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local unprivileged attacker may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux kernel 5.0.1 through 6.15-rc4&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-37890&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A use-after-free in the Linux kernel net scheduler HFSC module via netem&amp;rsquo;s re-entrant enqueue behaviour leads to local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-416: Use After Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss40-scoring-system&#34;&gt;CVSS4.0 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.5&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Breaking Out of Restricted Mode: XSS to RCE in Visual Studio Code</title>
      <link>https://starlabs.sg/blog/2025/05-breaking-out-of-restricted-mode-xss-to-rce-in-visual-studio-code/</link>
      <pubDate>Wed, 14 May 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/05-breaking-out-of-restricted-mode-xss-to-rce-in-visual-studio-code/</guid>
      <description>&lt;p&gt;In April 2024, I discovered a high-severity vulnerability in Visual Studio Code (VS Code &amp;lt;= 1.89.1) that allows attackers to escalate a Cross-Site Scripting (XSS) bug into full Remote Code Execution (RCE)—even in Restricted Mode.&lt;/p&gt;&#xA;&lt;p&gt;The desktop version of Visual Studio Code runs on Electron. Renderer processes are sandboxed and communicate with the main process through &lt;a href=&#34;https://www.electronjs.org/docs/latest/tutorial/ipc&#34;&gt;Electron&amp;rsquo;s IPC mechanism&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;An XSS vulnerability in the newly-introduced &lt;a href=&#34;https://code.visualstudio.com/updates/v1_89#_minimal-error-renderer&#34;&gt;minimal error rendering&lt;/a&gt; mode for Jupyter notebooks enables arbitrary JavaScript code to be executed within the &lt;code&gt;vscode-app&lt;/code&gt; WebView for the notebook renderer. The vulnerability can be triggered by opening a crafted &lt;code&gt;.ipynb&lt;/code&gt; file if the user has the setting enabled, or by opening a folder containing a crafted &lt;code&gt;settings.json&lt;/code&gt; file in VS Code and opening a malicious ipynb file within the folder. This vulnerability can be triggered even when Restricted Mode is enabled (which is the default for workspaces that have not been explicitly trusted by the user).&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-37797) Linux Kernel hfsc_change_class TOCTOU Leading to Use-After-Free and Local Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/25/25-37797/</link>
      <pubDate>Fri, 02 May 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-37797/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-37797&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Linux kernel (multiple stable branches through 6.15-rc)&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Linux Kernel (net_sched)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux Kernel&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local unprivileged attacker may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux kernel (multiple stable branches through 6.15-rc)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-37797&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A TOCTOU flaw in the Linux kernel HFSC qdisc&amp;rsquo;s hfsc_change_class allows an empty class to be inserted into the vttree, leading to a use-after-free and local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-416: Use After Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss40-scoring-system&#34;&gt;CVSS4.0 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.5&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2025-37798) Linux Kernel fq_codel_dequeue qlen Mismatch Leading to Use-After-Free and Local Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/25/25-37798/</link>
      <pubDate>Fri, 02 May 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/25/25-37798/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2025-37798&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Linux kernel 3.5 through 6.15-rc1&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Linux Kernel (net_sched)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux Kernel&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local unprivileged attacker may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux kernel 3.5 through 6.15-rc1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2025-37798&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A qlen mismatch in the Linux kernel fq_codel dequeue path allows dropped packets to go unreported to the parent qdisc, leading to a use-after-free and local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-416: Use After Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss40-scoring-system&#34;&gt;CVSS4.0 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.5&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CimFS: Crashing in memory, Finding SYSTEM (Kernel Edition)</title>
      <link>https://starlabs.sg/blog/2025/03-cimfs-crashing-in-memory-finding-system-kernel-edition/</link>
      <pubDate>Tue, 25 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/03-cimfs-crashing-in-memory-finding-system-kernel-edition/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;Many vulnerability writeups nowadays focus on the exploitation process when it comes to software bugs. The term &amp;ldquo;Exploit Developer&amp;rdquo; is also still used synonymously with Vulnerability Research, presumably coming from the early 2000s where bugs were easily discoverable and the community was just beginning to explore the art of exploitation. However nowadays with SDL and continuous fuzzing, the discovery of unknown vulnerabilities in crucial systems is getting more important, arguably more than the exploitation process. In order to encourage more writing on the aspect of Vulnerability Discovery, we are releasing this blogpost discussing the journey of finding and exploiting a kernel 0day in Windows 11 for Local Privilege Escalation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>STAR Labs Windows Exploitation Challenge 2025 Writeup</title>
      <link>https://starlabs.sg/blog/2025/03-star-labs-windows-exploitation-challenge-2025-writeup/</link>
      <pubDate>Mon, 17 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/03-star-labs-windows-exploitation-challenge-2025-writeup/</guid>
      <description>&lt;h1 id=&#34;star-labs-windows-exploitation-challenge-writeup&#34;&gt;STAR Labs Windows Exploitation Challenge Writeup&lt;/h1&gt;&#xA;&lt;p&gt;Over the past few months, the STAR Labs team has been hosting a &lt;a href=&#34;https://starlabs.sg/blog/2025/01-star-labs-2025-new-year-exploitation-challenge/&#34;&gt;Windows exploitation challenge&lt;/a&gt;. I was lucky enough to solve it and got myself a ticket to Off-By-One conference. Here is my writeup for the challenge!&lt;/p&gt;&#xA;&lt;h2 id=&#34;analyzing-the-binary&#34;&gt;Analyzing the binary&lt;/h2&gt;&#xA;&lt;p&gt;We are given a Windows kernel driver. Basic analysis shows that it is used to receive and save messages sent from usermode.&lt;/p&gt;&#xA;&lt;h3 id=&#34;important-structures&#34;&gt;Important structures&lt;/h3&gt;&#xA;&lt;p&gt;There are two key structures used in this driver: &lt;code&gt;handle&lt;/code&gt; and &lt;code&gt;message entry&lt;/code&gt;. &lt;code&gt;Message entry&lt;/code&gt; is the storage unit that saves our message from usermode, its structure is described below:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793)</title>
      <link>https://starlabs.sg/blog/2025/02-mali-cious-intent-exploiting-gpu-vulnerabilities-cve-2022-22706-/-cve-2021-39793/</link>
      <pubDate>Sun, 02 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/02-mali-cious-intent-exploiting-gpu-vulnerabilities-cve-2022-22706-/-cve-2021-39793/</guid>
      <description>&lt;p&gt;Imagine downloading a game from a third-party app store. You grant it seemingly innocuous permissions, but hidden within the app is a malicious exploit that allows attackers to steal your photos, eavesdrop on your conversations, or even take complete control of your device. This is the kind of threat posed by vulnerabilities like &lt;code&gt;CVE-2022-22706&lt;/code&gt; and &lt;code&gt;CVE-2021-39793&lt;/code&gt;, which we&amp;rsquo;ll be dissecting in this post. These vulnerabilities affect Mali GPUs, commonly found in many Android devices, and allow unprivileged apps to gain root access.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2024-26230: Windows Telephony Service - It&#39;s Got Some Call-ing Issues (Elevation of Privilege)</title>
      <link>https://starlabs.sg/blog/2025/01-cve-2024-26230-windows-telephony-service-its-got-some-call-ing-issues-elevation-of-privilege/</link>
      <pubDate>Fri, 24 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/01-cve-2024-26230-windows-telephony-service-its-got-some-call-ing-issues-elevation-of-privilege/</guid>
      <description>&lt;h2 id=&#34;executive-summary&#34;&gt;Executive Summary&lt;/h2&gt;&#xA;&lt;p&gt;&lt;code&gt;CVE-2024-26230&lt;/code&gt; is a critical vulnerability found in the Windows Telephony Service (TapiSrv), which can lead to an elevation of privilege on affected systems. The exploit leverages a use-after-free in &lt;code&gt;FreeDialogInstance&lt;/code&gt;. By manipulating the registry, an attacker controls memory allocation to create a fake object, triggering the UAF in &lt;code&gt;TUISPIDLLCallback&lt;/code&gt; to gain code execution. This is further chained with techniques to bypass mitigations like CFG and ultimately load a malicious DLL, escalating privileges to SYSTEM via &lt;a href=&#34;https://github.com/itm4n/PrintSpoofer&#34;&gt;PrintSpoofer&lt;/a&gt;. In this blog post, we will take an in-depth look at how this vulnerability works, how it can be exploited, and the mitigation strategies that can help defend against it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Celebrating 7 Years of STAR Labs SG</title>
      <link>https://starlabs.sg/blog/2025/01-celebrating-7-years-of-star-labs-sg/</link>
      <pubDate>Sun, 12 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/01-celebrating-7-years-of-star-labs-sg/</guid>
      <description>&lt;p&gt;🎉🎊 Cheers to 7 Amazing Years! 🎊🎉&lt;/p&gt;&#xA;&lt;p&gt;On 8th January 2018, STAR Labs SG Pte. Ltd. was born with a simple but bold idea: to do fun offensive research that protects customers. Seven years later, that spark of curiosity and innovation has grown into something extraordinary. 🚀&lt;/p&gt;&#xA;&lt;h2 id=&#34;our-humble-beginnings-&#34;&gt;Our Humble Beginnings 🛠️&lt;/h2&gt;&#xA;&lt;p&gt;It all started when STAR Labs had a small, passionate group of researchers: Shi Ji, Wei Lei, Phạm Hồng Phi, Phan Thanh Duy, and Tạ Đình Sung.&#xA;These pioneers didn’t just lay the foundation. They inspired others to join this wild roller coaster ride.&lt;/p&gt;</description>
    </item>
    <item>
      <title>STAR Labs 2025 New Year Exploitation Challenge</title>
      <link>https://starlabs.sg/blog/2025/01-star-labs-2025-new-year-exploitation-challenge/</link>
      <pubDate>Wed, 01 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2025/01-star-labs-2025-new-year-exploitation-challenge/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Think you’ve got what it takes to pop shells and snag your ticket to&amp;hellip; &lt;a href=&#34;https://re-verse.io/&#34;&gt;RE//verse&lt;/a&gt; and &lt;a href=&#34;https://offbyone.sg/&#34;&gt;Off-By-One&lt;/a&gt;?&lt;/strong&gt; 😏&lt;/p&gt;&#xA;&lt;h3 id=&#34;-windows-exploitation-challenge-&#34;&gt;🔥 &lt;strong&gt;Windows Exploitation Challenge&lt;/strong&gt; 🔥&lt;/h3&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Get &lt;strong&gt;SYSTEM privileges&lt;/strong&gt; by exploiting a bug in the downloadable driver below. (pwn it!)&lt;/li&gt;&#xA;&lt;li&gt;Keep the OS alive and happy — &lt;strong&gt;no BSODs, no excuses!&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;li&gt;Your exploit &lt;strong&gt;must work&lt;/strong&gt; on &lt;strong&gt;Windows 11 24H2&lt;/strong&gt;.&lt;/li&gt;&#xA;&lt;li&gt;Submit your winning solutions(&lt;strong&gt;exploit source code&lt;/strong&gt; and &lt;strong&gt;writeup&lt;/strong&gt;) to &lt;a href=&#34;mailto:info@starlabs.sg&#34;&gt;info@starlabs.sg&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;li&gt;If you think you&amp;rsquo;ve figured out the bug but can&amp;rsquo;t exploit it in time, feel free to send us a writeup too describing how you would exploit it!&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;strong&gt;🏆 Prizes up for grabs!&lt;/strong&gt;&lt;br&gt;&#xA;🥇 &lt;strong&gt;First to submit a working exploit wins a conference ticket to &lt;a href=&#34;https://re-verse.io/&#34;&gt;RE//verse&lt;/a&gt;!&lt;/strong&gt;&lt;br&gt;&#xA;🥈 &lt;strong&gt;Second to submit bags a conference ticket to &lt;a href=&#34;https://offbyone.sg/&#34;&gt;Off-By-One&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>All I Want for Christmas is a CVE-2024-30085 Exploit</title>
      <link>https://starlabs.sg/blog/2024/12-all-i-want-for-christmas-is-a-cve-2024-30085-exploit/</link>
      <pubDate>Tue, 24 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2024/12-all-i-want-for-christmas-is-a-cve-2024-30085-exploit/</guid>
      <description>&lt;h1 id=&#34;tldr&#34;&gt;TLDR&lt;/h1&gt;&#xA;&lt;p&gt;CVE-2024-30085 is a heap-based buffer overflow vulnerability affecting the Windows Cloud Files Mini Filter Driver &lt;code&gt;cldflt.sys&lt;/code&gt;. By crafting a custom reparse point, it is possible to trigger the buffer overflow to corrupt an adjacent &lt;code&gt;_WNF_STATE_DATA&lt;/code&gt; object. The corrupted &lt;code&gt;_WNF_STATE_DATA&lt;/code&gt; object can be used to leak a kernel pointer from an ALPC handle table object. A second buffer overflow is then used to corrupt another &lt;code&gt;_WNF_STATE_DATA&lt;/code&gt; object, which is then used to corrupt an adjacent &lt;code&gt;PipeAttribute&lt;/code&gt; object. By forging a &lt;code&gt;PipeAttribute&lt;/code&gt; object in userspace, we are able to leak the token address and override privileges to escalate privileges to NT AUTHORITY\SYSTEM.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Behind the Scenes: Understanding CVE-2022-24547</title>
      <link>https://starlabs.sg/blog/2024/12-behind-the-scenes-understanding-cve-2022-24547/</link>
      <pubDate>Tue, 24 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2024/12-behind-the-scenes-understanding-cve-2022-24547/</guid>
      <description>&lt;h1 id=&#34;tldr&#34;&gt;TL;dr&lt;/h1&gt;&#xA;&lt;p&gt;Vulnerabilities can often be found in places we don’t expect, and &lt;code&gt;CVE-2022-24547&lt;/code&gt; in &lt;code&gt;CastSrv.exe&lt;/code&gt; is one of the examples. CVE-2022-24547 is a privilege escalation vulnerability in CastSrv.exe, allowing attackers to bypass security and gain elevated privileges. We’ll break down how the bug works, its exploitation, and how to protect against it.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Security Impact&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Elevation of Privilege&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE ID&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2022-24547&#34;&gt;CVE-2022-24547&lt;/a&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt;   7.8&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-43626) Windows Telephony Service Heap Out-of-Bounds Read/Write Leading to Elevation of Privilege</title>
      <link>https://starlabs.sg/advisories/24/24-43626/</link>
      <pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-43626/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2024-43626&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Windows 10 (1507, 1607, 1809, 21H2, 22H2); Windows 11 (22H2, 23H2, 24H2); Windows Server 2008 and later&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Windows Telephony Service (&lt;code&gt;tapisrv.dll&lt;/code&gt;)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local unprivileged attacker may exploit this to elevate privileges to SYSTEM&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 10 (1507, 1607, 1809, 21H2, 22H2); Windows 11 (22H2, 23H2, 24H2); Windows Server 2008 and later&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Windows 11 23H2 (Build 22631.3593)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-43626&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper input validation in Windows Telephony Server in Microsoft Windows may allow an unprivileged attacker to execute code as SYSTEM&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-122: Heap-based Buffer Overflow&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>GPUAF: Two Ways of Rooting All Qualcomm-based Android Phones</title>
      <link>https://starlabs.sg/publications/gpuaf-two-ways-of-rooting-all-qualcomm-based-android-phones/</link>
      <pubDate>Thu, 07 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/gpuaf-two-ways-of-rooting-all-qualcomm-based-android-phones/</guid>
      <description>&lt;p&gt;Talk delivered at Power of Community (POC) 2024 (Seoul, November 2024).&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/POC%202024/Pan%20Zhenpeng%20%26%20Jheng%20Bing%20Jhong%2C%20GPUAF%20-%20Two%20ways%20of%20rooting%20All%20Qualcomm%20based%20Android%20phones.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VMware Workstation: Escaping via a New Route - Virtual Bluetooth</title>
      <link>https://starlabs.sg/publications/vmware-workstation-escaping-via-a-new-route-virtual-bluetooth/</link>
      <pubDate>Thu, 07 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/vmware-workstation-escaping-via-a-new-route-virtual-bluetooth/</guid>
      <description>&lt;p&gt;Talk delivered at Power of Community (POC) 2024 (Seoul, November 2024).&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/POC%202024/Nguyen%20Hoang%20Thach%2C%20VMware%20Workstation%20-%20Escaping%20via%20a%20New%20Route%20-%20Virtual%20Bluetooth.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>SpiritCyber 2024</title>
      <link>https://starlabs.sg/achievements/spiritcyber-2024/</link>
      <pubDate>Fri, 18 Oct 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/spiritcyber-2024/</guid>
      <description>&lt;p&gt;SpiritCyber is a Capture the Flag (CTF) competition held in Singapore, focused on offensive security and vulnerability research challenges.&lt;/p&gt;&#xA;&lt;p&gt;At SpiritCyber 2024, STAR Labs co-organised the event alongside Nanyang Technological University (NTU) and Ensign InfoSecurity. The competition was held on 18 October 2024 as part of the Singapore International Cyber Week (SICW).&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.facebook.com/SICWSG/posts/-spiritcyber-2024-hackathon-highlights-the-three-day-internet-of-things-iot-hack/852345070413697/&#34;&gt;SpiritCyber 2024 Hackathon Highlights (Facebook)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-9370) Google Chrome V8 Maglev Escape Analysis Incorrect Optimization Bug</title>
      <link>https://starlabs.sg/advisories/24/24-9370/</link>
      <pubDate>Tue, 01 Oct 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-9370/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2024-9370&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Google Chrome prior to stable channel update of October 1, 2024&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Google Chrome (V8 JavaScript Engine)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Google&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Google Chrome prior to stable channel update of October 1, 2024&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-9370&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;An incorrect optimization in V8&amp;rsquo;s Maglev compiler escape analysis allows a specially crafted HTML page to trigger a CHECK failure, potentially exploitable for arbitrary code execution in the renderer process&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-682: Incorrect Calculation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-6781) Calibre Arbitrary File Read</title>
      <link>https://starlabs.sg/advisories/24/24-6781/</link>
      <pubDate>Wed, 31 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-6781/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Calibre&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Calibre&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Unprivileged adversaries may exploit software vulnerabilities to perform relative path traversal to achieve arbitrary file read&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= 7.14.0 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;7.14.0&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-6781&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path Traversal&amp;rsquo;) vulnerability allows Relative Path Traversal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-22 Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path Traversal&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-139 Relative Path Traversal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.5 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-6782) Calibre Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/24/24-6782/</link>
      <pubDate>Wed, 31 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-6782/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Calibre&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Calibre&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Critical - Unprivileged adversaries may exploit software vulnerabilities to perform remote code execution&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;6.9.0 ~ 7.14.0 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;7.14.0&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-6782&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper Access Control in Calibre Content Server allows remote code execution&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-863: Incorrect Authorization&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-253: Remote Code Inclusion&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.8 (Critical)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Network&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;product-overview&#34;&gt;Product Overview&lt;/h2&gt;&#xA;&lt;p&gt;Calibre is a cross-platform free and open-source suite of e-book software. Calibre supports organizing existing e-books into virtual libraries, displaying, editing, creating and converting e-books, as well as syncing e-books with a variety of e-readers. Editing books is supported for EPUB and AZW3 formats. Books in other formats like MOBI must first be converted to those formats, if they are to be edited. Calibre also has a large collection of community contributed plugins.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-7008) Calibre Reflected Cross-Site Scripting (XSS)</title>
      <link>https://starlabs.sg/advisories/24/24-7008/</link>
      <pubDate>Wed, 31 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-7008/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Calibre&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Calibre&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= 7.15.0 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;7.15.0&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-7008&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or &amp;lsquo;Cross-site Scripting&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-591 Reflected XSS&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 5.4 (Medium)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Network&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Required&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;product-overview&#34;&gt;Product Overview&lt;/h2&gt;&#xA;&lt;p&gt;Calibre is a cross-platform free and open-source suite of e-book software. Calibre supports organizing existing e-books into virtual libraries, displaying, editing, creating and converting e-books, as well as syncing e-books with a variety of e-readers. Editing books is supported for EPUB and AZW3 formats. Books in other formats like MOBI must first be converted to those formats, if they are to be edited. Calibre also has a large collection of community contributed plugins.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-7009) Calibre SQLite Injection</title>
      <link>https://starlabs.sg/advisories/24/24-7009/</link>
      <pubDate>Wed, 31 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-7009/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Calibre&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Calibre&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= 7.15.0 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;7.15.0&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-7009&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-89 Improper Neutralization of Special Elements used in an SQL Command (&amp;lsquo;SQL Injection&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-66 SQL Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 4.2 (Medium)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Network&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;product-overview&#34;&gt;Product Overview&lt;/h2&gt;&#xA;&lt;p&gt;Calibre is a cross-platform free and open-source suite of e-book software. Calibre supports organizing existing e-books into virtual libraries, displaying, editing, creating and converting e-books, as well as syncing e-books with a variety of e-readers. Editing books is supported for EPUB and AZW3 formats. Books in other formats like MOBI must first be converted to those formats, if they are to be edited. Calibre also has a large collection of community contributed plugins.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-1837) Singtel RT5703W Unauthenticated Command Injection RCE via Login Vulnerability</title>
      <link>https://starlabs.sg/advisories/24/24-1837/</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-1837/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Singtel WI-FI 6 ROUTER RT5703W&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Singtel/Askey&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Critical - Adversaries may exploit software vulnerabilities to execute arbitrary commands on the underlying OS with root privileges.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;V1.6.4-5194 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;V1.6.4-5194 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Internal Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;STAR-2023-0097&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;TBD&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;OS command injection vulnerability in net.cgi in Singtel WI-FI 6 ROUTER RT5703W V1.6.4-5194 allows an unauthenticated attacker on LAN to execute arbitrary OS commands via the /cgi-bin/Login endpoint.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-78: Improper Neutralization of Special Elements used in an OS Command (&amp;lsquo;OS Command Injection&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-88: OS Command Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.3 (Critical)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-1838) Singtel RT5703W Authenticated Command Injection RCE via SetLoginPwd Vulnerability</title>
      <link>https://starlabs.sg/advisories/24/24-1838/</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-1838/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Singtel WI-FI 6 ROUTER RT5703W&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Singtel/Askey&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to execute arbitrary commands on the underlying OS with root privileges.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;V1.6.4-5194 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;V1.6.4-5194 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Internal Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;STAR-2023-0098&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;TBD&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;OS command injection vulnerability in net.cgi in Singtel WI-FI 6 ROUTER RT5703W V1.6.4-5194 allows an authenticated attacker on LAN to execute arbitrary OS commands via the /cgi-bin/login endpoint.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-78: Improper Neutralization of Special Elements used in an OS Command (&amp;lsquo;OS Command Injection&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-88: OS Command Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>#BadgeLife @ Off-By-One Conference 2024</title>
      <link>https://starlabs.sg/blog/2024/07-%23badgelife-@-off-by-one-conference-2024/</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2024/07-%23badgelife-@-off-by-one-conference-2024/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;As promised, we are releasing the firmware and this post for the Off-By-One badge about one month after the event, allowing interested participants the opportunity to explore it. If you&amp;rsquo;re interested in learning more about the badge design process, please let us know. We were thrilled to introduce the Octopus Badge at the first-ever Off-By-One Conference 2024. The badge was a one of the highlight at the conference, as it included hardware-focused CTF challenges. In this post, we will explore the ideation and design process of the badge and discuss the concepts needed to solve the challenges.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-26923) Android AF_UNIX Garbage Collector Race Condition Leading to Use-After-Free</title>
      <link>https://starlabs.sg/advisories/24/24-26923/</link>
      <pubDate>Mon, 01 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-26923/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2024-26923&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Android 14 (&lt;code&gt;google/bluejay/bluejay:14/AP1A.240405.002/11480754:user/release-keys&lt;/code&gt;); Linux kernel &amp;gt;= 2.6.23&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Android&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Google&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — exploitable from within &lt;code&gt;untrusted_app&lt;/code&gt; or &lt;code&gt;isolated_app&lt;/code&gt; SELinux context to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Android 14 (&lt;code&gt;AP1A.240405.002&lt;/code&gt;); Linux kernel &amp;gt;= 2.6.23 through 6.8.x&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-26923&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A race condition in the Linux kernel AF_UNIX garbage collector leads to a dangling pointer in &lt;code&gt;gc_inflight_list&lt;/code&gt;, exploitable for local privilege escalation on Android&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-362: Concurrent Execution Using Shared Resource with Improper Synchronization (Race Condition)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-34594) Samsung Galaxy Kernel Information Disclosure via Debug proc Entry Leading to KASLR Bypass</title>
      <link>https://starlabs.sg/advisories/24/24-34594/</link>
      <pubDate>Mon, 01 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-34594/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2024-34594&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Samsung Galaxy S22 (&lt;code&gt;samsung/r0qcsx/r0q:14/UP1A.231005.007/S901WVLS4DWL3:user/release-keys&lt;/code&gt;); Select Android 12, 13, 14 devices with Qualcomm chipsets&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 5.5 (Medium) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Samsung Galaxy Kernel (RKP Test Driver)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium — a local unprivileged attacker can read kernel memory addresses, bypassing KASLR&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S22 (Android 14); select Android 12, 13, 14 devices with Qualcomm chipsets; prior to SMR Jul-2024 Release 1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Samsung Galaxy S22 (&lt;code&gt;S901WVLS4DWL3&lt;/code&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-34594&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Exposure of sensitive information in the proc file system in Samsung Galaxy kernels allows local attackers to access kernel memory addresses prior to SMR Jul-2024 Release 1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-200: Exposure of Sensitive Information to an Unauthorized Actor&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 5.5 (Medium)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-36972) Linux Kernel Race Condition in unix_gc on oob_skb Leading to Double Free</title>
      <link>https://starlabs.sg/advisories/24/24-36972/</link>
      <pubDate>Thu, 16 May 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-36972/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2024-36972&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Linux kernel &amp;gt;= 6.8 (introduced by commit &lt;code&gt;1279f9d9&lt;/code&gt;, 3 Feb 2024)&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Linux Kernel&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — local attackers may exploit this vulnerability to elevate privileges to root&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux kernel &amp;gt;= 6.8 (upstream), introduced by commit &lt;code&gt;1279f9d9&lt;/code&gt; (3 Feb 2024)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-36972&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A use-after-free vulnerability in the Linux kernel unix socket can be exploited to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-415: Double Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-27828) Apple IOSurfaceRoot Reference Count Leak Leading to Kernel Panic and Code Execution</title>
      <link>https://starlabs.sg/advisories/24/24-27828/</link>
      <pubDate>Mon, 13 May 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-27828/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2024-27828&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: iOS and iPadOS before 17.5; tvOS before 17.5; watchOS before 10.5; visionOS before 1.2&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Apple IOSurface (&lt;code&gt;IOSurfaceRoot&lt;/code&gt;)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apple&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — an app may be able to execute arbitrary code with kernel privileges&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;iOS/iPadOS &amp;lt; 17.5; tvOS &amp;lt; 17.5; watchOS &amp;lt; 10.5; visionOS &amp;lt; 1.2&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;iOS/macOS 14.1 beta (23B5056e)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-27828&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A memory handling issue may allow an app to execute arbitrary code with kernel privileges; addressed via improved memory handling&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-786: Access of Memory Location Before Start of Buffer; CWE-788: Access of Memory Location After End of Buffer&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Send()-ing Myself Belated Christmas Gifts - GitHub.com&#39;s Environment Variables &amp; GHES Shell</title>
      <link>https://starlabs.sg/blog/2024/05-send-ing-myself-belated-christmas-gifts-github.coms-environment-variables-ghes-shell/</link>
      <pubDate>Mon, 06 May 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2024/05-send-ing-myself-belated-christmas-gifts-github.coms-environment-variables-ghes-shell/</guid>
      <description>&lt;p&gt;Earlier this year, in mid-January, you might have come across &lt;a href=&#34;https://github.blog/2024-01-16-rotating-credentials-for-github-com-and-new-ghes-patches/&#34;&gt;this security announcement&lt;/a&gt; by GitHub.&lt;/p&gt;&#xA;&lt;p&gt;In this article, I will unveil the shocking story of how I discovered &lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-0200&#34;&gt;CVE-2024-0200&lt;/a&gt;, a deceptively simple, one-liner vulnerability which I initially assessed to likely be of low impact, and how I turned it into one of the most impactful bugs in GitHub&amp;rsquo;s bug bounty history.&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Spoiler:&lt;/strong&gt; The vulnerability enabled disclosure of &lt;strong&gt;all&lt;/strong&gt; environment variables of a production container on &lt;code&gt;GitHub.com&lt;/code&gt;, including numerous access keys and secrets. Additionally, this vulnerability can be further escalated to achieve remote code execution (RCE) on GitHub Enterprise Servers (GHES), but not on &lt;code&gt;GitHub.com&lt;/code&gt;. More on this later.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Send()-ing Myself Belated Christmas Gifts: GitHub.com&#39;s Environment Variables &amp; GHES Shell</title>
      <link>https://starlabs.sg/blog/2024/04-send-ing-myself-belated-christmas-gifts-github.coms-environment-variables-ghes-shell/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2024/04-send-ing-myself-belated-christmas-gifts-github.coms-environment-variables-ghes-shell/</guid>
      <description>&lt;p&gt;Short version: while poking at GitHub Enterprise Server (GHES) for an unrelated reason the day after Christmas, I noticed an unvalidated &lt;code&gt;Kernel#send()&lt;/code&gt; call in the organization repository settings component. I expected it to be mildly useful, at most leaking file paths or affecting my own organisation. Production GitHub.com proved otherwise.&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-primitive&#34;&gt;The primitive&lt;/h2&gt;&#xA;&lt;p&gt;The component in &lt;code&gt;app/components/organizations/settings/repository_items_component.rb&lt;/code&gt; forwards a user-controlled &lt;code&gt;rid_key&lt;/code&gt; parameter directly to &lt;code&gt;send()&lt;/code&gt; on the repository dependency object. Ruby&amp;rsquo;s &lt;code&gt;Kernel#send&lt;/code&gt; dispatches the argument as a method name, which (with the right object graph) gives you a read primitive over arbitrary methods of the target object.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Vancouver 2024</title>
      <link>https://starlabs.sg/achievements/pwn2own-vancouver-2024/</link>
      <pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-vancouver-2024/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2024/1/16/pwn2own-vancouver-2024-bring-cloud-nativecontainer-security-to-pwn2own&#34;&gt;2024 spring edition of Pwn2Own (Pwn2Own Vancouver)&lt;/a&gt; was held from 20th March to 21st March 2024 in a hybrid format where participants are back to competing in-person and in virtual.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Route to Safety: Navigating Router Pitfalls</title>
      <link>https://starlabs.sg/blog/2024/03-route-to-safety-navigating-router-pitfalls/</link>
      <pubDate>Mon, 18 Mar 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2024/03-route-to-safety-navigating-router-pitfalls/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;Wi-Fi routers have always been an attractive target for attackers. When taken over, an attacker may gain access to a victim&amp;rsquo;s internal network or sensitive data. Additionally, there has been an ongoing trend of attackers continually &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2023/4/21/tp-link-wan-side-vulnerability-cve-2023-1389-added-to-the-mirai-botnet-arsenal&#34;&gt;incorporating new router exploits into their arsenal for use in botnets, such as the Mirai Botnet&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Consumer grade devices are especially attractive to attackers, due to many security flaws in them. Devices with lower security often contain multiple bugs that attackers can exploit easily, rendering them vulnerable targets. On the other hand, there are more secure devices that offer valuable insights and lessons to learn from.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2024-27791) Apple PMP Firmware Out-of-Bounds Write via ApplePMPv2 writeDashboard</title>
      <link>https://starlabs.sg/advisories/24/24-27791/</link>
      <pubDate>Mon, 22 Jan 2024 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/24/24-27791/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2024-27791&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: iOS and iPadOS before 16.7.5 and before 17.3; macOS Monterey before 12.7.3; macOS Ventura before 13.6.4; macOS Sonoma before 14.3; tvOS before 17.3&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.1 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Apple PMP Firmware (&lt;code&gt;ApplePMPv2&lt;/code&gt;)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apple&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — an app may be able to corrupt co-processor memory&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;iOS/iPadOS &amp;lt; 16.7.5, &amp;lt; 17.3; macOS Monterey &amp;lt; 12.7.3; macOS Ventura &amp;lt; 13.6.4; macOS Sonoma &amp;lt; 14.3; tvOS &amp;lt; 17.3&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;macOS 13.3 beta3 (Mac Studio); iOS 16.4 latest beta&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2024-27791&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;An app may be able to corrupt coprocessor memory due to improper memory buffer operations; addressed via improved validation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-119: Improper Restriction of Operations within Memory Buffer Bounds&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.1 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-3368) Chamilo LMS Unauthenticated Command Injection</title>
      <link>https://starlabs.sg/advisories/23/23-3368/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-3368/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.20&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.20 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-3368&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Command injection in &lt;code&gt;/main/webservices/additional_webservices.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. This is a bypass of CVE-2023-34960.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-78: Improper Neutralization of Special Elements used in an OS Command&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-88 OS Command Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.8 (Critical)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:N/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-3533) Chamilo LMS Unauthenticated Remote Code Execution via Arbitrary File Write</title>
      <link>https://starlabs.sg/advisories/23/23-3533/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-3533/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.20&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.20 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-3533&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Path traversal in file upload functionality in &lt;code&gt;/main/webservices/additional_webservices.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.20 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via arbitrary file write.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-22: Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path Traversal&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-139: Relative Path Traversal, CAPEC-76: Manipulating Web Input to File System Calls&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.8 (Critical)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:N/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-3545) Chamilo LMS Htaccess File Upload Security Bypass</title>
      <link>https://starlabs.sg/advisories/23/23-3545/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-3545/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.20&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.20 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-3545&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper sanitisation in &lt;code&gt;main/inc/lib/fileUpload.lib.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of &lt;code&gt;.htaccess&lt;/code&gt; file. This vulnerability may be exploited by privileged attackers or chained with unauthenticated arbitrary file write vulnerabilities, such as &lt;a href=&#34;https://starlabs.sg/advisories/23/23-3533/&#34;&gt;CVE-2023-3533&lt;/a&gt;, to achieve remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-178: Improper Handling of Case Sensitivity&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-650: Upload a Web Shell to a Web Server&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.8 (Critical)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:N/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4220) Chamilo LMS Unauthenticated Big Upload File Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4220/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4220/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.24 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4220&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unrestricted file upload in big file upload functionality in &lt;code&gt;/main/inc/lib/javascript/bigupload/inc/bigUpload.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-434: Unrestricted Upload of File with Dangerous Type&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-650: Upload a Web Shell to a Web Server&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.1 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4221) Chamilo LMS Learning Path PPT2LP OpenofficePresentation Command Injection</title>
      <link>https://starlabs.sg/advisories/23/23-4221/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4221/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.24 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4221&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Command injection in &lt;code&gt;main/lp/openoffice_presentation.class.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.24 allows users permitted to upload Learning Paths to obtain remote code execution via improper neutralisation of special characters.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-78: Improper Neutralization of Special Elements used in an OS Command&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-88 OS Command Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.2 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:N/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4222) Chamilo LMS Learning Path PPT2LP OpenofficeTextDocument Command Injection</title>
      <link>https://starlabs.sg/advisories/23/23-4222/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4222/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.24 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4222&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Command injection in &lt;code&gt;main/lp/openoffice_text_document.class.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.24 allows users permitted to upload Learning Paths to obtain remote code execution via improper neutralisation of special characters.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-78: Improper Neutralization of Special Elements used in an OS Command&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-88 OS Command Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.2 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:N/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4223) Chamilo LMS Document Ajax File Upload Functionality Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4223/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4223/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.24 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4223&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unrestricted file upload in &lt;code&gt;/main/inc/ajax/document.ajax.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-434: Unrestricted Upload of File with Dangerous Type&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-650: Upload a Web Shell to a Web Server&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4224) Chamilo LMS Dropbox Ajax File Upload Functionality Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4224/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4224/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.24 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4224&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unrestricted file upload in &lt;code&gt;/main/inc/ajax/dropbox.ajax.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-434: Unrestricted Upload of File with Dangerous Type&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-650: Upload a Web Shell to a Web Server&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4225) Chamilo LMS Exercise Ajax File Upload Functionality Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4225/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4225/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.24 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4225&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unrestricted file upload in &lt;code&gt;/main/inc/ajax/exercise.ajax.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-434: Unrestricted Upload of File with Dangerous Type&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-650: Upload a Web Shell to a Web Server&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4226) Chamilo LMS Work Ajax File Upload Functionality Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-4226/</link>
      <pubDate>Tue, 28 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4226/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Chamilo&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Chamilo&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain unauthenticated remote code execution.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= v1.11.24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v1.11.24 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4226&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unrestricted file upload in &lt;code&gt;/main/inc/ajax/work.ajax.php&lt;/code&gt; in Chamilo LMS &amp;lt;= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-434: Unrestricted Upload of File with Dangerous Type&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-650: Upload a Web Shell to a Web Server&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exploitation of a kernel pool overflow from a restrictive chunk size (CVE-2021-31969)</title>
      <link>https://starlabs.sg/blog/2023/11-exploitation-of-a-kernel-pool-overflow-from-a-restrictive-chunk-size-cve-2021-31969/</link>
      <pubDate>Fri, 24 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/11-exploitation-of-a-kernel-pool-overflow-from-a-restrictive-chunk-size-cve-2021-31969/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;The prevalence of memory corruption bugs persists, posing a persistent challenge for exploitation. This increased difficulty arises from advancements in defensive mechanisms and the escalating complexity of software systems. While a basic proof of concept often suffices for bug patching, the development of a functional exploit capable of bypassing existing countermeasures provides valuable insights into the capabilities of advanced threat actors. This holds particularly true for the scrutinized driver, &lt;code&gt;cldflt.sys&lt;/code&gt;, which has consistently received patches every Patch Tuesday since June. Notably, it has become a focal point for threat actors, following the exploits on &lt;code&gt;clfs.sys&lt;/code&gt; and &lt;code&gt;afd.sys&lt;/code&gt; drivers. In this article, we aim to highlight the significance of cldflt.sys and advocate for increased research into this driver and its associated components.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-1713) Bitrix24 Remote Command Execution (RCE) via Insecure Temporary File Creation</title>
      <link>https://starlabs.sg/advisories/23/23-1713/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-1713/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Bitrix24&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-1713&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagram.php in Bitrix24 22.0.300 hosted on Apache HTTP Server allows remote authenticated attackers to execute arbitrary code via uploading a crafted &amp;ldquo;.htaccess&amp;rdquo; file.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-73 External Control of File Name or Path; CWE-434 Unrestricted Upload of File with Dangerous Type&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-549 Local Execution of Code&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-1714) Bitrix24 Remote Command Execution (RCE) via Unsafe Variable Extraction</title>
      <link>https://starlabs.sg/advisories/23/23-1714/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-1714/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Bitrix24&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-1714&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-73 External Control of File Name or Path; CWE-502 Deserialization of Untrusted Data&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-549 Local Execution of Code&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;1-rce-via-appending-arbitrary-content-to-existing-php-files&#34;&gt;1. RCE via appending arbitrary content to existing PHP files&lt;/h2&gt;&#xA;&lt;h3 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h3&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-1715 &amp; CVE-2023-1716) Bitrix24 Stored Cross-Site Scripting (XSS) via Improper Input Neutralization on Invoice Edit Page</title>
      <link>https://starlabs.sg/advisories/23/23-1715/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-1715/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Bitrix24&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Critical&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-1715 &amp;amp; CVE-2023-1716&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&lt;em&gt;(CVE-2023-1715)&lt;/em&gt;: A logic error when using mb_strpos() to check for potential XSS payload in Bitrix24 22.0.300 allows attackers to bypass XSS sanitisation via placing HTML tags at the begining of the payload. &lt;em&gt;(CVE-2023-1716)&lt;/em&gt;: Cross-site scripting (XSS) vulnerability in Invoice Edit Page in Bitrix24 22.0.300 allows attackers to execute arbitrary JavaScript code in the victim&amp;rsquo;s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-83 Improper Neutralization of Script in Attributes in a Web Page&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-592 Stored XSS&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.0 (Critical)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-1717) Bitrix24 Cross-Site Scripting (XSS) via Client-side Prototype Pollution</title>
      <link>https://starlabs.sg/advisories/23/23-1717/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-1717/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Bitrix24&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Critical&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-1717&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Prototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victim’s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting &lt;code&gt;__proto__[tag]&lt;/code&gt; and &lt;code&gt;__proto__[text]&lt;/code&gt;.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-1321 Prototype Pollution; CWE-79 Improper Neutralization of Input During Web Page Generation (&amp;lsquo;Cross-site Scripting&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-588 DOM-Based XSS&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.6 (Critical)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-1718) Bitrix24 Denial-of-Service (DoS) via Improper File Stream Access</title>
      <link>https://starlabs.sg/advisories/23/23-1718/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-1718/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Bitrix24&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-1718&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper file stream access in /desktop_app/file.ajax.php?action=uploadfile in Bitrix24 22.0.300 allows unauthenticated remote attackers to cause denial-of-service via a crafted &amp;ldquo;tmp_url&amp;rdquo;.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-835 Loop with Unreachable Exit Condition (&amp;lsquo;Infinite Loop&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-545 Pull Data from System Resources&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.5 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-1719) Bitrix24 Insecure Global Variable Extraction</title>
      <link>https://starlabs.sg/advisories/23/23-1719/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-1719/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Bitrix24&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-1719&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim&amp;rsquo;s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-665 Improper Initialization; CWE-454 External Initialization of Trusted Variables or Data Stores&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-77 Manipulating User-Controlled Variables; CAPEC-591 Reflected XSS&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.5 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-1720) Bitrix24 Stored Cross-Site Scripting (XSS) via File Upload</title>
      <link>https://starlabs.sg/advisories/23/23-1720/</link>
      <pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-1720/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Bitrix24&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Bitrix24 22.0.300 (latest version as of writing)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-1720&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim&amp;rsquo;s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-434 Unrestricted Upload of File with Dangerous Type&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-592 Stored XSS&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.6 (Critical)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Toronto 2023</title>
      <link>https://starlabs.sg/achievements/pwn2own-toronto-2023/</link>
      <pubDate>Fri, 27 Oct 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-toronto-2023/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2023/7/12/the-soho-smashup-returns-for-pwn2own-toronto-2023&#34;&gt;2023 fall edition of Pwn2Own (Pwn2Own Toronto)&lt;/a&gt; was held from 24th October to 27th October 2023 in a hybrid format (offline and online).&lt;/p&gt;</description>
    </item>
    <item>
      <title>SpiritCyber 2023</title>
      <link>https://starlabs.sg/achievements/spiritcyber-2023/</link>
      <pubDate>Wed, 18 Oct 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/spiritcyber-2023/</guid>
      <description>&lt;p&gt;SpiritCyber is a Capture the Flag (CTF) competition held in Singapore, focused on offensive security and vulnerability research challenges.&lt;/p&gt;&#xA;&lt;p&gt;At SpiritCyber 2023, STAR Labs researchers competed across two separate teams and claimed both 2nd and 3rd place in the competition.&lt;/p&gt;&#xA;&lt;p&gt;The teams comprised Billy Jheng Bing-Jhong, Pan Zhenpeng, Li Jiantao, Daniel Lim Wee Soong, Muhammad Alifa Ramdhan, and Nguyễn Hoàng Thạch.&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/posts/we-decided-to-take-part-in-iot-hackathon-ugcPost-7120774588082311169-OfR6/&#34;&gt;STAR Labs — SpiritCyber 2023 (LinkedIn)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>A Year Fuzzing XNU Mach IPC</title>
      <link>https://starlabs.sg/publications/a-year-fuzzing-xnu-mach-ipc/</link>
      <pubDate>Fri, 13 Oct 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/a-year-fuzzing-xnu-mach-ipc/</guid>
      <description>&lt;p&gt;Talk delivered at Hexacon 2023 (Paris, October 2023), covering a sustained fuzzing campaign against XNU&amp;rsquo;s Mach IPC subsystem. The presentation walks through the fuzzer architecture, corpus construction, bug triage, and a selection of findings uncovered over the course of the year.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/Hexacon%202023/A%20Year%20Fuzzing%20XNU%20Mach%20IPC.pptx&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4197) Dolibarr ERP CRM (&lt;= 18.0.1) Improper Input Sanitization Authenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-4197/</link>
      <pubDate>Wed, 11 Oct 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4197/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Dolibarr                  ERP CRM&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Dolibarr&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= 18.0.1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;17.0.1, 18.0.1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4197&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper input validation in Dolibarr ERP CRM &amp;lt;= v18.0.1 fails to strip certain PHP code from user-supplied input when creating a Website, allowing an attacker to inject and evaluate arbitrary PHP code.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-20: Improper Input Validation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-248 Command Injection &lt;br&gt; CAPEC-153: Input Data Manipulation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.5 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-4198) Dolibarr ERP CRM (&lt;= 17.0.3) Improper Access Control</title>
      <link>https://starlabs.sg/advisories/23/23-4198/</link>
      <pubDate>Wed, 11 Oct 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-4198/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Dolibarr                  ERP CRM&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Dolibarr&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= 17.0.3&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;17.0.1, 17.0.3&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-4198&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper Access Control in Dolibarr ERP CRM v17.0.3 allows unauthorized users to read a database table containing sensitive third-party customers&amp;rsquo; information via the ajaxcompanies.php endpoint.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-862 Missing Authorization&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 6.5 (Medium)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-30591) NodeBB Pre-Authentication Denial-of-Service</title>
      <link>https://starlabs.sg/advisories/23/23-30591/</link>
      <pubDate>Fri, 29 Sep 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-30591/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;NodeBB&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;NodeBB&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Unprivileged attackers are able to cause NodeBB to crash and exit permanently&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt; &lt;a href=&#34;https://github.com/NodeBB/NodeBB/tree/v2.8.11&#34;&gt;v2.8.11&lt;/a&gt; (Commit &lt;a href=&#34;https://github.com/NodeBB/NodeBB/commit/82f0efb14b466998edb52fd8f10582508e958173&#34;&gt;82f0efb&lt;/a&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&lt;a href=&#34;https://github.com/NodeBB/NodeBB/tree/v2.8.9&#34;&gt;v2.8.9&lt;/a&gt; (Commit &lt;a href=&#34;https://github.com/NodeBB/NodeBB/commit/fb100ac73128aa6b06efa9fd6738466fc674aa1b&#34;&gt;fb100ac&lt;/a&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-30591&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Denial-of-service in NodeBB &amp;lt;= v2.8.10 allows unauthenticated attackers to trigger a crash, when invoking &lt;code&gt;eventName.startsWith()&lt;/code&gt; or &lt;code&gt;eventName.toString()&lt;/code&gt;, while processing Socket.IO messages via crafted Socket.IO messages containing array or object type for the event name respectively.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-241: Improper Handling of Unexpected Data Type&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-153: Input Data Manipulation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.5 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Analysis of NodeBB Account Takeover Vulnerability (CVE-2022-46164)</title>
      <link>https://starlabs.sg/blog/2023/09-analysis-of-nodebb-account-takeover-vulnerability-cve-2022-46164/</link>
      <pubDate>Fri, 29 Sep 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/09-analysis-of-nodebb-account-takeover-vulnerability-cve-2022-46164/</guid>
      <description>&lt;p&gt;Back in January 2023, I tasked one of our web security interns, River Koh (&lt;a href=&#34;https://twitter.com/oceankex&#34;&gt;@oceankex&lt;/a&gt;), to perform n-day analysis of &lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2022-46164&#34;&gt;CVE-2022-46164&lt;/a&gt; as part of his internship with STAR Labs. The overall goal is to perform an objective assessment of the vulnerability based on the facts gathered. In addition, I challenged him to reproduce the vulnerability without referencing any other materials besides the textual contents of the &lt;a href=&#34;https://github.com/NodeBB/NodeBB/security/advisories/GHSA-rf3g-v8p5-p675&#34;&gt;official advisory by NodeBB&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;about-cve-2022-46164&#34;&gt;About CVE-2022-46164&lt;/h2&gt;&#xA;&lt;p&gt;CVE-2022-46164 affects NodeBB, an open-source community forum platform built on Node.js with the addition of either a Redis, MongoDB, or PostgreSQL database. One of the features of the platform is the utilization of the Socket.IO for instant interactions and real-time notifications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-41984) Apple AppleSPU Shared Memory Read/Write Mapping Leading to Kernel Panic and Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-41984/</link>
      <pubDate>Tue, 26 Sep 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-41984/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2023-41984&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: macOS Monterey before 12.7; macOS Ventura before 13.6; macOS Sonoma before 14; iOS and iPadOS before 16.7; iOS 17 and iPadOS 17; tvOS before 17; watchOS before 10&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Apple AppleSPU (&lt;code&gt;AppleSPUHIDDriverUserClient&lt;/code&gt;)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apple&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local user may be able to execute arbitrary code with kernel privileges&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;macOS Monterey &amp;lt; 12.7; macOS Ventura &amp;lt; 13.6; macOS Sonoma &amp;lt; 14; iOS/iPadOS &amp;lt; 16.7; tvOS &amp;lt; 17; watchOS &amp;lt; 10&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;macOS 13.4; iOS 16.5&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-41984&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A memory handling issue in Apple operating systems may allow an app to execute arbitrary code with kernel privileges; addressed via improved memory handling&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-732: Incorrect Permission Assignment for Critical Resource&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>[P2O Vancouver 2023] SharePoint Pre-Auth RCE chain (CVE-2023–29357 &amp; CVE-2023–24955)</title>
      <link>https://starlabs.sg/blog/2023/09-p2o-vancouver-2023-sharepoint-pre-auth-rce-chain-cve-202329357-cve-202324955/</link>
      <pubDate>Mon, 25 Sep 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/09-p2o-vancouver-2023-sharepoint-pre-auth-rce-chain-cve-202329357-cve-202324955/</guid>
      <description>&lt;h2 id=&#34;brief&#34;&gt;Brief&lt;/h2&gt;&#xA;&lt;p&gt;I may have achieved successful exploitation of a SharePoint target during Pwn2Own Vancouver 2023. While the live demonstration lasted only approximately 30 seconds, it is noteworthy that the process of discovering and crafting the exploit chain consumed nearly a year of meticulous effort and research to complete the full exploit chain.&lt;/p&gt;&#xA;&lt;p&gt;This exploit chain leverages two vulnerabilities to achieve pre-auth remote code execution (RCE) on the SharePoint server:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Authentication Bypass &amp;ndash; An unauthenticated attacker can impersonate as any SharePoint user by spoofing valid JSON Web Tokens (JWTs), using the &lt;code&gt;none&lt;/code&gt; signing algorithm to subvert signature validation checks when verifying JWT tokens used for OAuth authentication. This vulnerability has been found right after I started this project for two days.&lt;/li&gt;&#xA;&lt;li&gt;Code Injection &amp;ndash; A SharePoint user with &lt;code&gt;Sharepoint Owners&lt;/code&gt; permission can inject arbitrary code by replacing &lt;code&gt;/BusinessDataMetadataCatalog/BDCMetadata.bdcm&lt;/code&gt; file in the web root directory to cause compilation of the injected code into an assembly that is subsequently executed by SharePoint. This vulnerability was found on Feb 2022.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;The specific part of the Authentication Bypass vuln is: it can access to SharePoint API only. So, the most difficult part is to find the post-auth RCE chain that using SP API.&lt;/p&gt;</description>
    </item>
    <item>
      <title>nftables Adventures: Bug Hunting and N-day Exploitation (CVE-2023-31248)</title>
      <link>https://starlabs.sg/blog/2023/09-nftables-adventures-bug-hunting-and-n-day-exploitation-cve-2023-31248/</link>
      <pubDate>Mon, 25 Sep 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/09-nftables-adventures-bug-hunting-and-n-day-exploitation-cve-2023-31248/</guid>
      <description>&lt;p&gt;During my internship, I have been researching and trying to find bugs within the nftables subsystem. In this blog post, I will talk about a bug I have found, as well as the exploitation of an n-day discovered by Mingi Cho &amp;ndash; &lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2023-31248&#34;&gt;CVE-2023-31248&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;introduction-to-nftables&#34;&gt;Introduction to nftables&lt;/h2&gt;&#xA;&lt;p&gt;nftables is a modern packet filtering framework that aims to replace the legacy {ip,ip6,arp,eb}_tables (xtables) infrastructure. It reuses the existing netfilter hooks, which act as entry points for handlers that perform various operations on packets. Nftables table objects contain a list of chain objects, which contain a list of rule objects, which finally contain expressions, which perform the operations of the pseudo-state machine.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-2315) Path Traversal in OpenCart versions 4.0.0.0 to 4.0.2.2</title>
      <link>https://starlabs.sg/advisories/23/23-2315/</link>
      <pubDate>Mon, 18 Sep 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-2315/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;OpenCart&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;OpenCart&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to empty any file on the server with write permissions.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;4.0.0.0 - 4.0.2.2&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Version(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;4.0.2.2&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-2315&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Path traversal in Opencart versions 4.0.0.0 to 4.0.2.2 allows authenticated backend users to empty any existing file on the server with write permissions.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-27 - Path Traversal: &amp;lsquo;dir/../../filename&amp;rsquo;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-126 - Path Traversal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.1 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-2016) Attendize &lt;= 2.8.0 Authenticated TOCTOU Allows Multiple Refunds Per Order</title>
      <link>https://starlabs.sg/advisories/23/23-2016/</link>
      <pubDate>Mon, 28 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-2016/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Attendize&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Attendize&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium - Adversaries may exploit software vulnerabilities to achieve monetary gains.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&amp;lt;= 2.8.0&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Version(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;2.8.0&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-2016&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Time-of-check Time-of-use (TOCTOU) in Cancellation in Attendize 2.8.0 allows adversaries to obtain multiple refunds for a single order.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-29 - Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 6.5 (Medium)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-32523) Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&lt;= Critical Patch 3) Unauthenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-32523/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-32523/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Trend Micro Mobile Security (Enterprise) 9.8 SP5&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Critical&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&amp;lt;= Critical Patch 3)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Version(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro Mobile Security (Enterprise) 9.8 SP5 (Critical Patch 3)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-32523&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper implementation of the authentication mechanism results in authentication bypass for affected installations of Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&amp;lt;= Critical Patch 3) in the /widget endpoint. The vulnerability exists in the WFUser class where non-existent user accounts are automatically created with a blank password upon receiving an incoming request. This results in attackers being able to interact with authenticated endpoints after exploiting this vulnerability.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-287: Improper Authentication&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-115: Authentication Bypass&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.8 (Critical)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-32524) Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&lt;= Critical Patch 3) Unauthenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-32524/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-32524/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Trend Micro Mobile Security (Enterprise) 9.8 SP5&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Critical&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&amp;lt;= Critical Patch 3)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Version(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro Mobile Security (Enterprise) 9.8 SP5 (Critical Patch 3)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-32524&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper implementation of the authentication mechanism results in authentication bypass for affected installations of Trend Micro Mobile Security (Enterprise) 9.8 SP5 (&amp;lt;= Critical Patch 3) in the /widgetforsecurity endpoint. The vulnerability exists in the WFUser class where non-existent user accounts are automatically created with a blank password upon receiving an incoming request. This results in attackers being able to interact with authenticated endpoints after exploiting this vulnerability.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-287: Improper Authentication&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-115: Authentication Bypass&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.8 (Critical)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-32529) Trend Micro Apex Central 2019 (&lt;= Build 6016) Authenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-32529/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-32529/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Trend Micro Apex Central 2019&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apex Central 2019 Build &amp;lt;= 6016&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Version(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apex Central 2019 Build 6016&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-32529&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Missing input validation in Apex Central 2019 Build 6016 and below uses user-supplied certificate values to construct a part of a SQL query that is executed in the DeleteCertById() function. This results in an SQL injection vulnerability whereby an attacker can leverage to execute system commands in the context of the IUSR user.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-89: Improper Neutralization of Special Elements used in an SQL Command (&amp;lsquo;SQL Injection&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-66: SQL Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-32530) Trend Micro Apex Central 2019 (&lt;= Build 6016) Authenticated RCE</title>
      <link>https://starlabs.sg/advisories/23/23-32530/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-32530/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Trend Micro Apex Central 2019&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apex Central 2019 Build &amp;lt;= 6016&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Version(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apex Central 2019 Build 6016&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-32530&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Missing input validation in Apex Central 2019 Build 6016 and below uses user-supplied certificate values to construct a part of a SQL query that is executed in the AddCert() function. This results in an SQL injection vulnerability whereby an attacker can leverage to execute system commands in the context of the IUSR user.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-89: Improper Neutralization of Special Elements used in an SQL Command (&amp;lsquo;SQL Injection&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-66: SQL Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-38624) Trend Micro Apex Central 2019 (&lt;= Build 6394) Authenticated SSRF</title>
      <link>https://starlabs.sg/advisories/23/23-38624/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-38624/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Trend Micro Apex Central 2019&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apex Central 2019 Build &amp;lt;= 6394&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Version(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apex Central 2019 Build 6394&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-38624&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Missing input validation in Apex Central 2019 Build 6394 and below uses user-supplied values to perform a server-side request in a function in modTMSL. This results in a SSRF vulnerability whereby an attacker can force the server to make arbitrary requests to any URL or endpoints, including those on the local network, in order to exfiltrate sensitive information that are normally not accessible to the public.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-918: Server-Side Request Forgery (SSRF)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-664: Server Side Request Forgery&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.1 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-38625) Trend Micro Apex Central 2019 (&lt;= Build 6394) Authenticated SSRF</title>
      <link>https://starlabs.sg/advisories/23/23-38625/</link>
      <pubDate>Tue, 22 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-38625/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Trend Micro Apex Central 2019&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Trend Micro&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apex Central 2019 Build &amp;lt;= 6394&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Version(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Apex Central 2019 Build 6394&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-38625&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Missing input validation in Apex Central 2019 Build 6394 and below uses user-supplied values to perform a server-side request in a function in modDeepSecurity. This results in a SSRF vulnerability whereby an attacker can force the server to make arbitrary requests to any URL or endpoints, including those on the local network, in order to exfiltrate sensitive information that are normally not accessibleto the public to the public.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-918: Server-Side Request Forgery (SSRF)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-664: Server Side Request Forgery&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 9.1 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-2110) Obsidian Local File Disclosure</title>
      <link>https://starlabs.sg/advisories/23/23-2110/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-2110/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Obsidian&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Obsidian&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Obsidian &amp;lt; 1.2.8&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Obsidian 1.1.16&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-2110&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via &amp;ldquo;app://local/&amp;lt;absolute-path&amp;gt;&amp;rdquo;. This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-22 Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path Traversal&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-597 Absolute Path Traversal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.2 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-2316) Typora Local File Disclosure</title>
      <link>https://starlabs.sg/advisories/23/23-2316/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-2316/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Typora&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora for Windows/Linux &amp;lt; 1.6.7&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora for Windows 1.5.12, Typora for Linux 1.5.10&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-2316&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via &amp;ldquo;typora://app/&amp;lt;absolute-path&amp;gt;&amp;rdquo;. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-22 Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path Traversal&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-597 Absolute Path Traversal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 6.3 (Medium)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-2317) Typora DOM-Based Cross-site Scripting leading to Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-2317/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-2317/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Typora&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora for Windows/Linux &amp;lt; 1.6.7&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora for Windows 1.5.12, Typora for Linux 1.5.10&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-2317&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading &amp;ldquo;typora://app/typemark/updater/update.html&amp;rdquo; in &amp;lt;embed&amp;gt; tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-79 - Improper Neutralization of Input During Web Page Generation (&amp;lsquo;Cross-site Scripting&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-588 DOM-Based XSS, CAPEC-549 Local Execution of Code&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.6 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-2318) MarkText DOM-Based Cross-site Scripting leading to Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/23/23-2318/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-2318/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;MarkText&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;MarkText&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;MarkText &amp;lt;= 0.17.1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;MarkText 0.17.1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-2318&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-79 - Improper Neutralization of Input During Web Page Generation (&amp;lsquo;Cross-site Scripting&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-588 DOM-Based XSS, CAPEC-549 Local Execution of Code&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.6 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-2971) Typora Local File Disclosure (Patch Bypass)</title>
      <link>https://starlabs.sg/advisories/23/23-2971/</link>
      <pubDate>Sat, 19 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-2971/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Typora&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora for Windows/Linux &amp;lt; 1.7.0-dev&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Typora for Windows 1.6.7, Typora for Linux 1.6.6&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-2971&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via &amp;ldquo;typora://app/typemark/&amp;rdquo;. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-22 Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path Traversal&amp;rsquo;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-139 Relative Path Traversal&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 6.3 (Medium)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ghosts of the Past: Classic PHP RCE Bugs in Trend Micro Enterprise Offerings</title>
      <link>https://starlabs.sg/publications/ghosts-of-the-past-classic-php-rce-bugs-in-trend-micro-enterprise-offerings/</link>
      <pubDate>Fri, 18 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/ghosts-of-the-past-classic-php-rce-bugs-in-trend-micro-enterprise-offerings/</guid>
      <description>&lt;p&gt;Talk delivered at HITCON CMT 2023 (Taipei, August 2023). The research examines how well-understood PHP vulnerability patterns — deserialization, file inclusion, command injection — continue to appear in enterprise security products from major vendors, with case studies drawn from Trend Micro&amp;rsquo;s enterprise line.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/HITCON%202023/Ghosts%20of%20the%20Past%20-%20Classic%20PHP%20RCE%20Bugs%20in%20Trend%20Micro%20Enterprise%20Offerings.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>What You See IS NOT What You Get: Pwning Electron-based Markdown Note-taking Apps</title>
      <link>https://starlabs.sg/publications/what-you-see-is-not-what-you-get-pwning-electron-based-markdown-note-taking-apps/</link>
      <pubDate>Fri, 18 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/what-you-see-is-not-what-you-get-pwning-electron-based-markdown-note-taking-apps/</guid>
      <description>&lt;p&gt;Talk delivered at HITCON CMT 2023 (Taipei, August 2023). The presentation explores how Markdown rendering pipelines in popular Electron-based note-taking applications can be abused to achieve code execution, chaining parser quirks with Electron&amp;rsquo;s Node.js integration.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/HITCON%202023/Pwning%20Electron-based%20Markdown%20Note-taking%20Apps.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2023 Most Valuable Security Researchers (Annual)</title>
      <link>https://starlabs.sg/achievements/msrc-2023-most-valuable-security-researchers-annual/</link>
      <pubDate>Tue, 08 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2023-most-valuable-security-researchers-annual/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Ngo Wei Lin, Billy Jheng Bing-Jhong, and Bruce Chen Yu-Jen were recognised as Most Valuable Researchers in Microsoft&amp;rsquo;s 2023 annual leaderboard, ranking &lt;strong&gt;#26 globally&lt;/strong&gt; — reflecting a year of high-quality vulnerability reports to the Microsoft Security Response Centre.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Under The Hood - Disassembling of IKEA-Sonos Symfonisk Speaker Lamp</title>
      <link>https://starlabs.sg/blog/2023/08-under-the-hood-disassembling-of-ikea-sonos-symfonisk-speaker-lamp/</link>
      <pubDate>Tue, 01 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/08-under-the-hood-disassembling-of-ikea-sonos-symfonisk-speaker-lamp/</guid>
      <description>&lt;p&gt;We are excited to embark on a series of teardowns to explore the inner workings of various devices. In this particular teardown, our focus will be on the &lt;code&gt;1st-Generation of IKEA-SONOS SYMFONISK Speaker Lamp&lt;/code&gt;, unraveling its captivating inner workings.&lt;/p&gt;&#xA;&lt;p&gt;Please note that due to prior testing, certain screws, wires, and components have been temporarily removed from the appliance and may not be present during this analysis. However, for the purpose of this exercise, we have meticulously reassembled the SYMFONISK to its approximate original state.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A new method for container escape using file-based DirtyCred</title>
      <link>https://starlabs.sg/blog/2023/07-a-new-method-for-container-escape-using-file-based-dirtycred/</link>
      <pubDate>Tue, 25 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/07-a-new-method-for-container-escape-using-file-based-dirtycred/</guid>
      <description>&lt;p&gt;Recently, I was trying out various exploitation techniques against a Linux kernel vulnerability, &lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2022-3910&#34;&gt;CVE-2022-3910&lt;/a&gt;. After successfully writing an exploit which made use of DirtyCred to gain local privilege escalation, my mentor Billy asked me if it was possible to tweak my code to facilitate a container escape by overwriting &lt;code&gt;/proc/sys/kernel/modprobe&lt;/code&gt; instead.&lt;/p&gt;&#xA;&lt;p&gt;The answer was more complicated than expected; this led me down a long and dark rabbit hole&amp;hellip;&lt;/p&gt;&#xA;&lt;p&gt;In this post, I will discuss the root cause of the vulnerability, as well as the various methods I used to exploit it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>prctl anon_vma_name: An Amusing Linux Kernel Heap Spray</title>
      <link>https://starlabs.sg/blog/2023/07-prctl-anon_vma_name-an-amusing-linux-kernel-heap-spray/</link>
      <pubDate>Tue, 25 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/07-prctl-anon_vma_name-an-amusing-linux-kernel-heap-spray/</guid>
      <description>&lt;h2 id=&#34;tldr&#34;&gt;TLDR&lt;/h2&gt;&#xA;&lt;p&gt;&lt;code&gt;prctl PR_SET_VMA (PR_SET_VMA_ANON_NAME)&lt;/code&gt; can be used as a (possibly new!) heap spray method targeting the &lt;code&gt;kmalloc-8&lt;/code&gt; to &lt;code&gt;kmalloc-96&lt;/code&gt; caches. The sprayed object, &lt;code&gt;anon_vma_name&lt;/code&gt;, is dynamically sized, and can range from larger than 4 bytes to a maximum of 84 bytes. The object can be easily allocated and freed via the &lt;code&gt;prctl&lt;/code&gt; syscall, and leaked information can be obtained via reading the &lt;code&gt;proc/pid/maps&lt;/code&gt; file. The advantage of this method is that it does not require a cross-cache attack from cg/other caches (unlike other objects such as &lt;code&gt;msg_msg&lt;/code&gt;) as &lt;code&gt;anon_vma_name&lt;/code&gt; is allocated with the &lt;code&gt;GFP_KERNEL&lt;/code&gt; flag.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-3513) RazerCentralService unsafe deserialization Escalation of Privilege Vulnerability</title>
      <link>https://starlabs.sg/advisories/23/23-3513/</link>
      <pubDate>Fri, 14 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-3513/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Razer CentralService&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Razer&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain privilege escalation.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Razer Central 7.11.0.558 and below&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Razer Central 7.8.0.381 to 7.11.0.558&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-3513&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Local&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;product-overview&#34;&gt;Product Overview&lt;/h2&gt;&#xA;&lt;p&gt;&lt;code&gt;Razer Synapse 3&lt;/code&gt; is a software suite developed by Razer, a leading gaming hardware manufacturer. It serves as a centralized hub for customizing and optimizing Razer peripherals, including keyboards, mice, headsets, and other gaming accessories. With its intuitive user interface, Synapse 3 allows gamers to personalize their devices by creating unique profiles, assigning macros, and fine-tuning settings such as lighting effects and DPI sensitivity. This software provides seamless integration with cloud storage, enabling users to access their personalized configurations from anywhere. With its advanced features and extensive compatibility, Razer Synapse 3 empowers gamers to enhance their gaming experience and gain a competitive edge.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-3514) RazerCentralSerivce unsafe NamedPipe permission Escalation of Privilege Vulnerability</title>
      <link>https://starlabs.sg/advisories/23/23-3514/</link>
      <pubDate>Fri, 14 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-3514/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Razer CentralService&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Razer&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit software vulnerabilities to obtain privilege escalation.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Razer Central 7.11.0.558 and below&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Razer Central 7.8.0.381 to 7.11.0.558&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-3514&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Local&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;product-overview&#34;&gt;Product Overview&lt;/h2&gt;&#xA;&lt;p&gt;&lt;code&gt;Razer Synapse 3&lt;/code&gt; is a software suite developed by Razer, a leading gaming hardware manufacturer. It serves as a centralized hub for customizing and optimizing Razer peripherals, including keyboards, mice, headsets, and other gaming accessories. With its intuitive user interface, Synapse 3 allows gamers to personalize their devices by creating unique profiles, assigning macros, and fine-tuning settings such as lighting effects and DPI sensitivity. This software provides seamless integration with cloud storage, enabling users to access their personalized configurations from anywhere. With its advanced features and extensive compatibility, Razer Synapse 3 empowers gamers to enhance their gaming experience and gain a competitive edge.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2023 Q2 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-2023-q2-most-valuable-security-researchers/</link>
      <pubDate>Fri, 14 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2023-q2-most-valuable-security-researchers/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Ngo Wei Lin, Billy Jheng Bing-Jhong, and Bruce Chen Yu-Jen were recognised in Microsoft&amp;rsquo;s Q2 2023 Most Valuable Security Researchers leaderboard for high-quality vulnerability reports submitted to MSRC.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Breaking the Code - Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability</title>
      <link>https://starlabs.sg/blog/2023/06-breaking-the-code-exploiting-and-examining-cve-2023-1829-in-cls_tcindex-classifier-vulnerability/</link>
      <pubDate>Mon, 19 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/06-breaking-the-code-exploiting-and-examining-cve-2023-1829-in-cls_tcindex-classifier-vulnerability/</guid>
      <description>&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;The discovery and analysis of vulnerabilities is a critical aspect of cybersecurity research. Today, we will dive into &lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2023-1829&#34;&gt;CVE-2023-1829&lt;/a&gt;, a vulnerability in the &lt;code&gt;cls_tcindex&lt;/code&gt; network traffic classifier found by Valis. We will explore the process of exploiting and examining this vulnerability, shedding light on the intricate details and potential consequences. We have thoroughly tested our exploit on &lt;code&gt;Ubuntu 22.04&lt;/code&gt; with kernel version &lt;code&gt;5.15.0-25&lt;/code&gt;, which was built from the official &lt;code&gt;5.15.0-25.25&lt;/code&gt; source code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Old, The New and The Bypass - One-click/Open-redirect to own Samsung S22 at Pwn2Own 2022</title>
      <link>https://starlabs.sg/blog/2023/06-the-old-the-new-and-the-bypass-one-click/open-redirect-to-own-samsung-s22-at-pwn2own-2022/</link>
      <pubDate>Wed, 14 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/06-the-old-the-new-and-the-bypass-one-click/open-redirect-to-own-samsung-s22-at-pwn2own-2022/</guid>
      <description>&lt;h2 id=&#34;tldr&#34;&gt;TLDR;&lt;/h2&gt;&#xA;&lt;p&gt;We began our work on Samsung immediately after the release of the &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2022/8/29/announcing-pwn2own-toronto-2022-and-introducing-the-soho-smashup&#34;&gt;Pwn2Own Toronto 2022 target list&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;In this article, we will dive into the details of an open-redirect vulnerability discovered during the Pwn2Own 2022 event and how we exploited it on a Samsung S22 device. By breaking down the technical aspects and using code snippets, we aim to provide a comprehensive overview of this critical security flaw.&lt;/p&gt;&#xA;&lt;p&gt;To begin, I revisited our team&amp;rsquo;s paper (written by &lt;a href=&#34;https://twitter.com/cursered&#34;&gt;Li Jiantao&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/hi_im_d4rkn3ss&#34;&gt;Nguyễn Hoàng Thạch&lt;/a&gt;) from previous year, where two bugs were identified. One of these bugs was exploited in P2O, while the other was promptly addressed. Interestingly, detailed documentation on one of these bugs is available &lt;a href=&#34;https://ssd-disclosure.com/ssd-advisory-galaxy-store-applications-installation-launching-without-user-interaction/&#34;&gt;here&lt;/a&gt;, allowing readers to gain a better understanding of this specific vulnerability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Unearthing Vulnerabilities in the Apple Ecosystem: The Art of KidFuzzerV2.0</title>
      <link>https://starlabs.sg/publications/unearthing-vulnerabilities-in-the-apple-ecosystem-the-art-of-kidfuzzerv2.0/</link>
      <pubDate>Fri, 19 May 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/unearthing-vulnerabilities-in-the-apple-ecosystem-the-art-of-kidfuzzerv2.0/</guid>
      <description>&lt;p&gt;Talk delivered at Offensivecon 2023 (Berlin, May 2023). The presentation introduces KidFuzzerV2.0, a purpose-built fuzzer for Apple kernel and userspace components, detailing the design decisions behind corpus management, mutation strategies, and coverage instrumentation, along with a walkthrough of notable bugs uncovered.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/Offensivecon%202023/Unearthing%20Vulnerabilities%20in%20the%20Apple%20Ecosystem%20The%20Art%20of%20KidFuzzerV2.0.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Exchange Powershell Remoting Deserialization leading to RCE (CVE-2023-21707)</title>
      <link>https://starlabs.sg/blog/2023/04-microsoft-exchange-powershell-remoting-deserialization-leading-to-rce-cve-2023-21707/</link>
      <pubDate>Fri, 28 Apr 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/04-microsoft-exchange-powershell-remoting-deserialization-leading-to-rce-cve-2023-21707/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;While analyzing &lt;code&gt;CVE-2022-41082&lt;/code&gt;, also known as ProxyNotShell, we discovered this vulnerability which we have detailed in this blog. However, for a comprehensive understanding, we highly recommend reading the &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend&#34;&gt;thorough analysis&lt;/a&gt; written by team ZDI.&lt;/p&gt;&#xA;&lt;p&gt;To aid in understanding, we present a visual representation of &lt;code&gt;CVE-2022-41082&lt;/code&gt; below.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/blog/2023/images/CVE-2023-21707_0x0001.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;The sink of ProxyNotShell:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-CSharp&#34; data-lang=&#34;CSharp&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;//System.Management.Automation.InternalDeserializer.ReadOneObject()&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#ff7b72&#34;&gt;internal&lt;/span&gt; &lt;span style=&#34;color:#ff7b72&#34;&gt;object&lt;/span&gt; ReadOneObject(&lt;span style=&#34;color:#ff7b72&#34;&gt;out&lt;/span&gt; &lt;span style=&#34;color:#ff7b72&#34;&gt;string&lt;/span&gt; streamName)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;{&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;//...&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    Type targetTypeForDeserialization = psobject.GetTargetTypeForDeserialization(&lt;span style=&#34;color:#ff7b72&#34;&gt;this&lt;/span&gt;._typeTable); &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;//[1]&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#ff7b72&#34;&gt;if&lt;/span&gt; (&lt;span style=&#34;color:#79c0ff&#34;&gt;null&lt;/span&gt; != targetTypeForDeserialization)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Exception ex = &lt;span style=&#34;color:#79c0ff&#34;&gt;null&lt;/span&gt;;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#ff7b72&#34;&gt;try&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ff7b72&#34;&gt;object&lt;/span&gt; obj2 = LanguagePrimitives.ConvertTo(obj, targetTypeForDeserialization, &lt;span style=&#34;color:#79c0ff&#34;&gt;true&lt;/span&gt;, CultureInfo.InvariantCulture, &lt;span style=&#34;color:#ff7b72&#34;&gt;this&lt;/span&gt;._typeTable); &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;//[2]&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        }&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;//...&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;At &lt;strong&gt;[2]&lt;/strong&gt;, if &lt;code&gt;targetTypeForDeserialization&lt;/code&gt; != null, it will continue to call &lt;code&gt;LanguagePrimitives.ConvertTo()&lt;/code&gt; to convert the original &lt;code&gt;obj&lt;/code&gt; to the Type specified by &lt;code&gt;targetTypeForDeserialization&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-2017) Shopware 6 Server-side Template Injection (SSTI) via Twig Security Extension</title>
      <link>https://starlabs.sg/advisories/23/23-2017/</link>
      <pubDate>Mon, 17 Apr 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-2017/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Shopware&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Shopware AG&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Users with login access to Shopware Admin panel may be able to obtain remote code/command execution&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&lt;a href=&#34;https://github.com/shopware/platform/tree/v6.4.18.1&#34;&gt;v6.4.18.1&lt;/a&gt; &amp;lt;= &lt;a href=&#34;https://github.com/shopware/platform/tree/v6.4.20.0&#34;&gt;v6.4.20.0&lt;/a&gt;, &lt;a href=&#34;https://github.com/shopware/platform/tree/v6.5.0.0-rc1&#34;&gt;v6.5.0.0-rc1&lt;/a&gt; &amp;lt;= &lt;a href=&#34;https://github.com/shopware/platform/tree/v6.5.0.0-rc4&#34;&gt;v6.5.0.0-rc4&lt;/a&gt; (Commit &lt;a href=&#34;https://github.com/shopware/platform/commit/facfc886f326a591e0f77c45f34ef84c437ee4f1&#34;&gt;facfc88&lt;/a&gt;)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;v6.4.20.0 (Latest stable version), v6.5.0.0-rc3 (Latest pre-release version)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-2017&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Server-side Template Injection (SSTI) in Shopware 6 (&amp;lt;= v6.4.20.0, v6.5.0.0-rc1 &amp;lt;= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in &lt;code&gt;Shopware\Core\Framework\Adapter\Twig\SecurityExtension&lt;/code&gt; and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-184: Incomplete List of Disallowed Inputs, CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CAPEC Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CAPEC-242: Code Injection&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 8.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2023 Q1 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-2023-q1-most-valuable-security-researchers/</link>
      <pubDate>Thu, 13 Apr 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2023-q1-most-valuable-security-researchers/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Lê Hữu Quang Linh &lt;strong&gt;(#38)&lt;/strong&gt; was shortlisted for the Q1 2023 Microsoft Most Valuable Security Researchers leaderboard.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2023-1872) Linux Kernel io_uring Missing Lock in io_file_get_fixed Leading to Use-After-Free and Local Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/23/23-1872/</link>
      <pubDate>Wed, 12 Apr 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/23/23-1872/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2023-1872&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;: Linux kernel 5.7 through 5.17 (exclusive); stable branches 5.10.170, 5.15.96&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSS3.1&lt;/strong&gt;: 7.8 (High) — &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Linux Kernel (io_uring)&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux Kernel&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High — a local unprivileged attacker may exploit this to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Linux kernel 5.7 through 5.17; stable branches 5.10.170, 5.15.96&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2023-1872&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Description&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;A use-after-free vulnerability in the Linux kernel io_uring subsystem can be exploited to achieve local privilege escalation&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE Classification(s)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-416: Use After Free&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Vancouver 2023</title>
      <link>https://starlabs.sg/achievements/pwn2own-vancouver-2023/</link>
      <pubDate>Sat, 25 Mar 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-vancouver-2023/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2023/1/11/announcing-pwn2own-vancouver-for-2023&#34;&gt;2023 spring edition of Pwn2Own (Pwn2Own Vancouver)&lt;/a&gt; was held from 23rd March to 25th March 2023 in a hybrid format where participants are back to competing in-person and in virtual.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CS-Cart PDF Plugin Unauthenticated Command Injection</title>
      <link>https://starlabs.sg/blog/2023/03-cs-cart-pdf-plugin-unauthenticated-command-injection/</link>
      <pubDate>Fri, 03 Mar 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/03-cs-cart-pdf-plugin-unauthenticated-command-injection/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;p&gt;A command injection vulnerability exists in CS-Cart&amp;rsquo;s HTML to PDF converter (&lt;a href=&#34;https://github.com/cscart/pdf&#34;&gt;https://github.com/cscart/pdf&lt;/a&gt;) allowing unauthenticated attackers to achieve remote command execution (RCE). The vulnerability only affects the HTML to PDF converter service and the default hosted service at &lt;code&gt;converter.cart-services.com&lt;/code&gt; (maintained by CS-Cart&amp;rsquo;s development team) used by the PDF converter plugin, and does not allow for RCE against base installations of CS-Cart.&lt;/p&gt;&#xA;&lt;h2 id=&#34;product-background&#34;&gt;Product Background&lt;/h2&gt;&#xA;&lt;p&gt;In CS-Cart v4.13.2, the HTML to PDF converter is an optional plugin (disabled by default) for printing PDF documents in CS-Cart. However, the plugin is built-in and enabled by default in CS-Cart v4.13.1 or below.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Azure Account Takeover via DOM-based XSS in Cosmos DB Explorer</title>
      <link>https://starlabs.sg/blog/2023/02-microsoft-azure-account-takeover-via-dom-based-xss-in-cosmos-db-explorer/</link>
      <pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/02-microsoft-azure-account-takeover-via-dom-based-xss-in-cosmos-db-explorer/</guid>
      <description>&lt;p&gt;Upon finding the vulnerability, our team member, Ngo Wei Lin (&lt;a href=&#34;https://twitter.com/creastery&#34;&gt;@Creastery&lt;/a&gt;), immediately reported it to the Microsoft Security Response Center (MSRC) on 19th March 2022, who fixed the important issue with a &lt;a href=&#34;https://github.com/Azure/cosmos-explorer/commit/496f596f385e732e47579bd1b45b9ee5868fafac&#34;&gt;fix commited in the repo&lt;/a&gt; within seven days, which is impressive and a much faster response than other Microsoft bugs which we reported previously. The fix was pushed down to &lt;a href=&#34;https://cosmos.azure.com&#34;&gt;Azure Cosmos DB Explorer&lt;/a&gt; on 31st March 2022.&lt;/p&gt;&#xA;&lt;h2 id=&#34;about-the-dom-xss-vulnerability&#34;&gt;About the DOM XSS Vulnerability&lt;/h2&gt;&#xA;&lt;p&gt;The Azure Cosmos DB Explorer incorrectly accepts and processs cross-origin messages from certain domains. A remote attacker can take over a victim Azure user&amp;rsquo;s account by delivering a DOM-based XSS payload via a cross-origin message.&lt;/p&gt;</description>
    </item>
    <item>
      <title>STAR LABS SG PTE. LTD. has been authorized by the CVE Program as a CVE Numbering Authority (CNA)</title>
      <link>https://starlabs.sg/blog/2023/02-star-labs-sg-pte.-ltd.-has-been-authorized-by-the-cve-program-as-a-cve-numbering-authority-cna/</link>
      <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/02-star-labs-sg-pte.-ltd.-has-been-authorized-by-the-cve-program-as-a-cve-numbering-authority-cna/</guid>
      <description>&lt;p&gt;STAR LABS SG PTE. LTD. (STAR Labs) announced today that it has become a &lt;a href=&#34;https://www.cve.org/Media/News/item/news/2023/02/21/STAR-Labs-SG-Added-as-CNA&#34;&gt;CVE Numbering Authority (CNA)&lt;/a&gt; for the Common Vulnerabilities and Exposures (CVE®) system, a global cybersecurity community.&lt;/p&gt;&#xA;&lt;p&gt;As a CNA, STAR LABS is authorized to assign CVE Identifiers（CVE IDs）to newly discovered vulnerabilities and publicly disclose information about these vulnerabilities through CVE Records. Identifying vulnerabilities with CVE IDs can speed up the awareness and understanding of those vulnerabilities, enabling security researchers and system managers to expedite solutions. Going forward, as a CNA, STAR LABS will practice responsible and timely disclosure when publishing CVE Records for vulnerabilities we discover, enhancing coverage and cyber security for the industry.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Gotta KEP-tcha &#39;Em All - Bypassing Anti-Debugging methods in KEPServerEX</title>
      <link>https://starlabs.sg/blog/2023/02-gotta-kep-tcha-em-all-bypassing-anti-debugging-methods-in-kepserverex/</link>
      <pubDate>Fri, 17 Feb 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/02-gotta-kep-tcha-em-all-bypassing-anti-debugging-methods-in-kepserverex/</guid>
      <description>&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;Lately, my focus has been on discovering any potential vulnerabilities in &lt;a href=&#34;https://www.ptc.com/en/products/kepware/kepserverex&#34;&gt;KEPServerEX&lt;/a&gt;.&#xA;KEPServerEX is the industry&amp;rsquo;s leading connectivity platform that provides a single source of industrial automation data to all your applications. Users can connect, manage, monitor, and control diverse automation devices and software applications through one intuitive user interface.&lt;/p&gt;&#xA;&lt;p&gt;This software employs multiple anti-debugging measures, making it challenging to discover any vulnerabilities and performing fuzzing on it. In this regard, I would like to share my perspective on the issue and my strategy for circumventing these measures.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dissecting the Vulnerabilities - A Comprehensive Teardown of acmailer&#39;s N-Days</title>
      <link>https://starlabs.sg/blog/2023/02-dissecting-the-vulnerabilities-a-comprehensive-teardown-of-acmailers-n-days/</link>
      <pubDate>Thu, 16 Feb 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2023/02-dissecting-the-vulnerabilities-a-comprehensive-teardown-of-acmailers-n-days/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;In this post, one of our recent intern, Wang Hengyue (&lt;a href=&#34;https://twitter.com/w_hy_04&#34;&gt;@w_hy_04&lt;/a&gt;) was given the task to analyse &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20617&#34;&gt;CVE-2021-20617&lt;/a&gt; &amp;amp; &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20618&#34;&gt;CVE-2021-20618&lt;/a&gt; in &lt;a href=&#34;https://www.acmailer.jp/download/index.html&#34;&gt;acmailer&lt;/a&gt; since there isn&amp;rsquo;t any public information on it. Today, we&amp;rsquo;ll be sharing his journey in dissecting the vulnerabilities in acmailer. Both vulnerabilities were originally found by &lt;a href=&#34;https://twitter.com/bulkneets&#34;&gt;ma.la&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;acmailer is a Perl-based email delivery application that provides functionality centered around sending mass emails, with associated functions such as registration and unregistration forms, surveys, and email templating.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Miami 2023</title>
      <link>https://starlabs.sg/achievements/pwn2own-miami-2023/</link>
      <pubDate>Thu, 16 Feb 2023 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-miami-2023/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.zerodayinitiative.com/blog/2022/11/30/pwn2own-returns-to-miami-beach-for-2023&#34;&gt;Pwn2Own Miami&lt;/a&gt; was held from 14th February to 16th February 2023 in a hybrid format (offline and online). &lt;a href=&#34;https://twitter.com/thezdi/status/1626313913712230403&#34;&gt;STAR Labs came in 4th in this edition of Pwn2Own&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deconstructing and Exploiting CVE-2020-6418</title>
      <link>https://starlabs.sg/blog/2022/12-deconstructing-and-exploiting-cve-2020-6418/</link>
      <pubDate>Wed, 21 Dec 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/12-deconstructing-and-exploiting-cve-2020-6418/</guid>
      <description>&lt;p&gt;As part of my internship at STAR Labs, I conducted n-day analysis of CVE-2020-6418. This vulnerability lies in the V8 engine of Google Chrome, namely its optimizing compiler Turbofan. Specifically, the vulnerable version is in Google Chrome&amp;rsquo;s V8 prior to 80.0.3987.122. In this article, I will give a step-by-step analysis of the vulnerability, from the root cause to exploitation.&lt;/p&gt;&#xA;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;In JavaScript, objects do not have a fixed type. Instead, V8 assigns each object a Map that reflects its type. This Map is considered reliable if it is guaranteed to be correct at that specific point in time, and it is unreliable if it could have been modified by another node beforehand. If the Map is unreliable, the object must be checked to have the correct type before it is used. This is done by insertion of &lt;code&gt;CheckMaps&lt;/code&gt; nodes or &lt;code&gt;CodeDependencies&lt;/code&gt;. When trying to optimise, Turbofan aims to insert as few Map checks as possible, and tries to do so only when necessary (i.e when the Map is unreliable and is going to be accessed).&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-44667) Windows CDirectMusicPortDownload Integer Overflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/22/22-44667/</link>
      <pubDate>Tue, 13 Dec 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-44667/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Microsoft DirectMusic&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft DirectMusic Core Services DLL (dmusic.dll) version 10.0.22000.1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft DirectMusic Core Services DLL (dmusic.dll) version 10.0.22000.1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2022-44667&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Local&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Required&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;product-overview&#34;&gt;Product Overview&lt;/h2&gt;&#xA;&lt;p&gt;Microsoft DirectMusic Core Services DLL is a dynamic link library (DLL) that is part of the DirectMusic component of the DirectX multimedia API for Windows operating systems. DirectMusic is a high-level music composition and playback system designed to simplify the process of creating and playing back music in Windows-based multimedia applications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-44668) Windows DirectMusicPortDownload Double Free Vulnerability</title>
      <link>https://starlabs.sg/advisories/22/22-44668/</link>
      <pubDate>Tue, 13 Dec 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-44668/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Microsoft DirectMusic&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft DirectMusic Core Services DLL (dmusic.dll) version 10.0.22000.1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft DirectMusic Core Services DLL (dmusic.dll) version 10.0.22000.1&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2022-44668&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Local&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Required&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;product-overview&#34;&gt;Product Overview&lt;/h2&gt;&#xA;&lt;p&gt;Microsoft DirectMusic Core Services DLL is a dynamic link library (DLL) that is part of the DirectMusic component of the DirectX multimedia API for Windows operating systems. DirectMusic is a high-level music composition and playback system designed to simplify the process of creating and playing back music in Windows-based multimedia applications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Toronto 2022</title>
      <link>https://starlabs.sg/achievements/pwn2own-toronto-2022/</link>
      <pubDate>Fri, 09 Dec 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-toronto-2022/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2022/8/29/announcing-pwn2own-toronto-2022-and-introducing-the-soho-smashup&#34;&gt;2022 fall edition of Pwn2Own (Pwn2Own Toronto)&lt;/a&gt; was held from 06th December to 09th December 2022 in a hybrid format (offline and online). &lt;a href=&#34;https://twitter.com/thezdi/status/1601326269102100486&#34;&gt;STAR Labs came in 4th in this edition of Pwn2Own&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Last Breath of Our Netgear RAX30 Bugs - A Tragic Tale before Pwn2Own Toronto 2022</title>
      <link>https://starlabs.sg/blog/2022/12-the-last-breath-of-our-netgear-rax30-bugs-a-tragic-tale-before-pwn2own-toronto-2022/</link>
      <pubDate>Tue, 06 Dec 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/12-the-last-breath-of-our-netgear-rax30-bugs-a-tragic-tale-before-pwn2own-toronto-2022/</guid>
      <description>&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;Some time ago, we were playing with some Netgear routers and we learned so much from this target.&lt;/p&gt;&#xA;&lt;p&gt;However, Netgear recently patched several vulnerabilities in their RAX30 router firmware, including the two vulnerabilities in the DHCP interface for the LAN side and one remote code execution vulnerability on the WAN side which we prepared for Pwn2Own Toronto 2022. This blog post focuses on the vulnerabilities found in version &lt;code&gt;1.0.7.78&lt;/code&gt;You can download the firmware from this &lt;a href=&#34;https://kb.netgear.com/000064989/RAX30-Firmware-Version-1-0-7-78&#34;&gt;link&lt;/a&gt;, and easily extract the firmware by using &lt;code&gt;binwalk&lt;/code&gt;. All vulnerabilities were found and tested in version &lt;code&gt;1.0.7.78&lt;/code&gt; of Netgear RAX30. Versions &lt;code&gt;1.0.7.78&lt;/code&gt; and earlier are known to be susceptible as well.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TheHole New World - how a small leak will sink a great browser (CVE-2021-38003)</title>
      <link>https://starlabs.sg/blog/2022/12-thehole-new-world-how-a-small-leak-will-sink-a-great-browser-cve-2021-38003/</link>
      <pubDate>Tue, 06 Dec 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/12-thehole-new-world-how-a-small-leak-will-sink-a-great-browser-cve-2021-38003/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;CVE-2021-38003 is a vulnerability that exists in the V8 Javascript engine. The vulnerability affects the Chrome browser before stable version &lt;code&gt;95.0.4638.69&lt;/code&gt;, and was disclosed in October 2021 in &lt;a href=&#34;https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html&#34;&gt;google&amp;rsquo;s chrome release blog&lt;/a&gt;, while the &lt;a href=&#34;https://bugs.chromium.org/p/chromium/issues/detail?id=1263462&#34;&gt;bug report&lt;/a&gt; was made public in February 2022.&lt;/p&gt;&#xA;&lt;p&gt;The vulnerability will cause a special value in V8 called &lt;code&gt;TheHole&lt;/code&gt; being leaked to the script. This can lead to a renderer RCE in a Chromium-based browser, and &lt;a href=&#34;https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/&#34;&gt;has been used in the wild.&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Multiple Vulnerabilities in Proxmox VE &amp; Proxmox Mail Gateway</title>
      <link>https://starlabs.sg/blog/2022/12-multiple-vulnerabilities-in-proxmox-ve-proxmox-mail-gateway/</link>
      <pubDate>Fri, 02 Dec 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/12-multiple-vulnerabilities-in-proxmox-ve-proxmox-mail-gateway/</guid>
      <description>&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;Proxmox Virtual Environment (Proxmox VE or PVE) is an open-source type-1 hypervisor. It includes a web-based management interface programmed in Perl. Another Proxmox product written in Perl, Proxmox Mail Gateway (PMG), comes with a similar web management interface. They share some of the codebases.&lt;/p&gt;&#xA;&lt;p&gt;In this article, I will introduce how to debug PVE&amp;rsquo;s web service step-by-step and analyse three bugs I have found in PVE and PMG.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;[UPDATE] This is a quick and minor update to this blog post. MITRE email back to us on 9th December 2022 assigned CVE-2022-35507 &amp;amp; CVE-2022-35508 for the remaining 2 bugs&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Backup and Pwn using Time Machine</title>
      <link>https://starlabs.sg/publications/how-to-backup-and-pwn-using-time-machine/</link>
      <pubDate>Thu, 10 Nov 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/how-to-backup-and-pwn-using-time-machine/</guid>
      <description>&lt;p&gt;Talk delivered at Power of Community (POC) 2022 (Seoul, November 2022). The research examines how macOS Time Machine&amp;rsquo;s backup and restore workflows introduce privileged operations that can be abused by a local attacker to escalate privileges, bypassing standard macOS hardening features.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/POC%202022/Nguyen%20Hoang%20Thach.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Journey To Hybrid Apple Driver Fuzzing</title>
      <link>https://starlabs.sg/publications/the-journey-to-hybrid-apple-driver-fuzzing/</link>
      <pubDate>Thu, 10 Nov 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/the-journey-to-hybrid-apple-driver-fuzzing/</guid>
      <description>&lt;p&gt;Talk delivered at Power of Community (POC) 2022 (Seoul, November 2022). The presentation describes a hybrid fuzzing architecture that combines coverage-guided feedback with grammar-aware generation to fuzz Apple kernel drivers more effectively, and surveys the vulnerability classes uncovered.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/POC%202022/Zhenpeng%20Pan.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft SharePoint Server Post-Authentication Server-Side Request Forgery vulnerability</title>
      <link>https://starlabs.sg/blog/2022/10-microsoft-sharepoint-server-post-authentication-server-side-request-forgery-vulnerability/</link>
      <pubDate>Tue, 25 Oct 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/10-microsoft-sharepoint-server-post-authentication-server-side-request-forgery-vulnerability/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Disclaimer:&lt;/strong&gt; No anime characters or animals were harmed during the research. The bug had been fixed but it did not meet that criterion required to get CVE.&lt;/p&gt;&#xA;&lt;p&gt;Recently, we have found a Server-Side Request Forgery (SSRF) in Microsoft SharePoint Server 2019 which allows remote authenticated users to send HTTP(S) requests to arbitrary URL and read the responses. The endpoint &lt;code&gt;&amp;lt;site&amp;gt;/_api/web/ExecuteRemoteLOB&lt;/code&gt; is vulnerable to Server-Side Request Forgery (SSRF). The HTTP(S) request is highly customizable in request method, path, headers and bodies. An attacker with the ability to perform SSRF attacks can scan the internal network, check for the existence of services on the host&amp;rsquo;s local network and potentially exploit other web services.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2022 Q3 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-2022-q3-most-valuable-security-researchers/</link>
      <pubDate>Mon, 24 Oct 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2022-q3-most-valuable-security-researchers/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Lê Hữu Quang Linh &lt;strong&gt;(#9)&lt;/strong&gt; was shortlisted for the Q3 2022 Microsoft Most Valuable Security Researchers leaderboard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/2022-Q3-Leaderboard-Windows-Nov-2022.png&#34; alt=&#34;MSRC Q3 2022 Windows leaderboard&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://msrc-blog.microsoft.com/2022/10/24/congratulations-to-the-top-msrc-2022-q3-security-researchers/&#34;&gt;MSRC blog: Top Q3 2022 Security Researchers&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Apple CoreText - An Unexpected Journey to Learn about Failure</title>
      <link>https://starlabs.sg/blog/2022/09-apple-coretext-an-unexpected-journey-to-learn-about-failure/</link>
      <pubDate>Thu, 29 Sep 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/09-apple-coretext-an-unexpected-journey-to-learn-about-failure/</guid>
      <description>&lt;p&gt;Late last year, I have focused my research on the CoreText framework for 2-3 months. In particular, the code related to the text shaping engine and the code responsible for parsing the AAT tables.&lt;/p&gt;&#xA;&lt;p&gt;During this research, I found an OOB (Out-Of-Bounds) Write in the &lt;a href=&#34;https://developer.apple.com/fonts/TrueType-Reference-Manual/RM06/Chap6morx.html&#34;&gt;&lt;code&gt;morx table&lt;/code&gt;&lt;/a&gt;. This series of writeups is to document my whole process, from selecting this attack surface to finding the bug to writing an exploit for it in Safari. I hope this is helpful for anyone interested in starting researching in this area or who wants to help finish the exploit on Safari (because it&amp;rsquo;s not done yet) :D&lt;/p&gt;</description>
    </item>
    <item>
      <title>Step-by-Step Walkthrough of CVE-2022-32792 - WebKit B3ReduceStrength Out-of-Bounds Write</title>
      <link>https://starlabs.sg/blog/2022/09-step-by-step-walkthrough-of-cve-2022-32792-webkit-b3reducestrength-out-of-bounds-write/</link>
      <pubDate>Thu, 08 Sep 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/09-step-by-step-walkthrough-of-cve-2022-32792-webkit-b3reducestrength-out-of-bounds-write/</guid>
      <description>&lt;p&gt;Recently, ZDI released the advisory for a &lt;a href=&#34;https://www.zerodayinitiative.com/advisories/ZDI-22-1123/&#34;&gt;Safari out-of-bounds write vulnerability&lt;/a&gt; exploited by Manfred Paul (@_manfp) in Pwn2Own. We decided to take a look at the &lt;a href=&#34;https://github.com/WebKit/WebKit/commit/6983e76741a1bad811783ceac0959ff9953c175d?diff=unified&#34;&gt;patch&lt;/a&gt; and try to exploit it.&lt;/p&gt;&#xA;&lt;p&gt;The patch is rather simple: it creates a new function (&lt;code&gt;IntRange::sExt&lt;/code&gt;) that is used to decide the integer range after applying a sign extension operation (in &lt;code&gt;rangeFor&lt;/code&gt;). Before this patch, the program assumes that the range stays the same after applying sign extension. This is incorrect and can result in wrongly removing an overflow/underflow check.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exploiting WebKit JSPropertyNameEnumerator Out-of-Bounds Read (CVE-2021-1789)</title>
      <link>https://starlabs.sg/blog/2022/08-exploiting-webkit-jspropertynameenumerator-out-of-bounds-read-cve-2021-1789/</link>
      <pubDate>Fri, 19 Aug 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/08-exploiting-webkit-jspropertynameenumerator-out-of-bounds-read-cve-2021-1789/</guid>
      <description>&lt;p&gt;Initially, our team member, &lt;a href=&#34;https://twitter.com/tuanit96&#34;&gt;Đỗ Minh Tuấn&lt;/a&gt;, wanted to write about the RCA (Root Cause Analysis) of CVE-2021-1870 which APT used. But &lt;a href=&#34;https://github.com/googleprojectzero/0days-in-the-wild/pull/14&#34;&gt;Maddie Stone pointed it to us that it was actually CVE-2021-1789&lt;/a&gt;.  None-the-less, we would still want to share with everyone the analysis done by &lt;a href=&#34;https://twitter.com/tuanit96&#34;&gt;Đỗ Minh Tuấn&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;The bug is assigned &lt;strong&gt;CVE-2021-1789&lt;/strong&gt; in &lt;a href=&#34;https://support.apple.com/en-us/HT212147&#34;&gt;security content of Safari 14.0.3&lt;/a&gt;. We successfully exploited it on WebKitGTK &amp;lt;= 2.30.5 or equivalent on WebKit.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;JSPropertyNameEnumerator&lt;/code&gt; is an internal object that helps JSC handle &lt;code&gt;for...in&lt;/code&gt; loop. JavaScriptCore (JSC) uses this object to cache information about the base object we put into the loop. JSC also allows iterating through the prototype chain of the base object, which means it can go through a proxy with a trap callback. However, JSC does not check the final size of the base object after iterating, leading to an out-of-bounds read.&lt;/p&gt;</description>
    </item>
    <item>
      <title>All Roads Lead to GKE&#39;s Host: 4&#43; Ways to Escape</title>
      <link>https://starlabs.sg/publications/all-roads-lead-to-gkes-host-4-ways-to-escape/</link>
      <pubDate>Thu, 11 Aug 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/all-roads-lead-to-gkes-host-4-ways-to-escape/</guid>
      <description>&lt;p&gt;Talk delivered at DEF CON 30 (Las Vegas, August 2022). The research catalogues four independent escape paths from Google Kubernetes Engine (GKE) pods to the host node, covering privilege escalation through misconfigured admission controllers, kernel vulnerabilities, and GKE-specific attack surfaces. The findings were responsibly disclosed to Google.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/Defcon%2030/Billy%20Jheng%20%20%20Muhammad%20Alifa%20Ramdhan%20-%20All%20Roads%20leads%20to%20GKEs%20Host%20%204%2B%20Ways%20to%20Escape.pdf&#34;&gt;Slides (GitHub)&lt;/a&gt; · &lt;a href=&#34;https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Billy%20Jheng%20%20%20Muhammad%20Alifa%20Ramdhan%20-%20All%20Roads%20leads%20to%20GKEs%20Host%20%204%2B%20Ways%20to%20Escape.pdf&#34;&gt;Official DEF CON mirror&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2022 Most Valuable Security Researchers (Annual)</title>
      <link>https://starlabs.sg/achievements/msrc-2022-most-valuable-security-researchers-annual/</link>
      <pubDate>Tue, 09 Aug 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2022-most-valuable-security-researchers-annual/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Ngo Wei Lin &lt;strong&gt;(#48)&lt;/strong&gt; was shortlisted in Microsoft&amp;rsquo;s 2022 annual Most Valuable Security Researchers leaderboard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/MSRC-MVP-2022-Leaderboard.png&#34; alt=&#34;MSRC 2022 Annual leaderboard&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://msrc-blog.microsoft.com/2022/08/08/congratulations-to-the-msrc-2022-most-valuable-researchers/&#34;&gt;MSRC blog: 2022 Most Valuable Researchers&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://twitter.com/msftsecresponse/status/1556696085665501185&#34;&gt;Twitter: @msftsecresponse announcement&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Gitlab Project Import RCE Analysis (CVE-2022-2185)</title>
      <link>https://starlabs.sg/blog/2022/07-gitlab-project-import-rce-analysis-cve-2022-2185/</link>
      <pubDate>Thu, 21 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/07-gitlab-project-import-rce-analysis-cve-2022-2185/</guid>
      <description>&lt;p&gt;At the beginning of this month, GitLab released a security patch for versions 14-&amp;gt;15. Interestingly in the advisory, there was a mention of a post-auth RCE bug with CVSS 9.9.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/blog/2022/images/07-20-01.png&#34; alt=&#34;image.png&#34;&gt;&#xA;The bug exists in GitLab&amp;rsquo;s &lt;code&gt;Project Imports&lt;/code&gt; feature, which was found by &lt;a href=&#34;https://hackerone.com/vakzz&#34;&gt;@vakzz&lt;/a&gt;. Incidentally, when I rummaged in the author&amp;rsquo;s h1 profile. I discovered that four months ago, he also found a bug in the import project feature:&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/blog/2022/images/07-20-02.png&#34; alt=&#34;image.png&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Initially, I thought it was tempting after seeing the bounty, so I started learning Rails and debugged this bug! (who would have thought that 30k wouldn&amp;rsquo;t be so easy ( ° ͜ʖ ͡°) )&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-26438) Asus System Control Interface Backup Local Privilege Escalation (LPE)</title>
      <link>https://starlabs.sg/advisories/22/22-36438/</link>
      <pubDate>Wed, 13 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-36438/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Asus System Control Interface&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Asus&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High - Adversaries may exploit this software vulnerability to set weak file permissions, leading to local privilege escalation.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;MyASUS: 3.1.5.0 &lt;br/&gt;ASUS System Control Interface: 3.1.4.0 &lt;br/&gt;File Version: 1.0.9.0 (AsusSwitch.exe)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;MyASUS: 3.1.5.0 &lt;br/&gt;ASUS System Control Interface: 3.1.4.0 &lt;br/&gt;File Version: 1.0.9.0 (AsusSwitch.exe)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2022-26438&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CWE-276 - Incorrect Default Permissions&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 7.8 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-26439) Asus System Control Interface Software Update Arbitrary File Deletion</title>
      <link>https://starlabs.sg/advisories/22/22-36439/</link>
      <pubDate>Wed, 13 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-36439/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary:&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Asus System Control Interface&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Asus&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium - Adversaries may exploit this software vulnerability to set weak file permissions, leading to local privilege escalation.&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;MyASUS: 3.1.5.0&lt;br/&gt;ASUS System Control Interface: 3.1.4.0&lt;br/&gt;File Version: 1.0.52.0 (AsusSoftwareManager.exe)&lt;br/&gt;1.0.44.0 (AsusLiveUpdate.dll)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;MyASUS: 3.1.5.0&lt;br/&gt;ASUS System Control Interface: 3.1.4.0&lt;br/&gt;File Version: 1.0.52.0 (AsusSoftwareManager.exe)&lt;br/&gt;1.0.44.0 (AsusLiveUpdate.dll)&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2022-26439&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CWE&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System:&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 6.0 (High)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Local&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;The &lt;code&gt;ASUS Control Interface&lt;/code&gt; is a set of drivers that are installed to help manage computers with ASUS hardware. To interact with the functionality that these drivers provide, the Windows Store application &lt;code&gt;MyASUS&lt;/code&gt; is required. The program has the functionality of manually checking for software updates. To do so, it communicates with &lt;code&gt;AsusSoftwareManager (AsusSoftwareManager.exe)&lt;/code&gt; service which runs with SYSTEM privileges to check for updates.&lt;/p&gt;</description>
    </item>
    <item>
      <title>io_uring - new code, new bugs, and a new exploit technique</title>
      <link>https://starlabs.sg/blog/2022/06-io_uring-new-code-new-bugs-and-a-new-exploit-technique/</link>
      <pubDate>Fri, 24 Jun 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/06-io_uring-new-code-new-bugs-and-a-new-exploit-technique/</guid>
      <description>&lt;p&gt;For the past few weeks, &lt;a href=&#34;https://twitter.com/junr0n&#34;&gt;I&lt;/a&gt; have been working on conducting N-day analysis and bug hunting in the io_uring subsystem of the Linux kernel with the guidance of my mentors, &lt;a href=&#34;https://twitter.com/st424204&#34;&gt;Billy&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/n0psledbyte&#34;&gt;Ramdhan&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;In this article, I will briefly discuss the io_uring subsystem, as well as my approach to discovering and developing a new kernel exploit technique during my N-day analysis of &lt;code&gt;CVE-2021-41073&lt;/code&gt;. I will also discuss two bugs I found while analyzing a new io_uring feature.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Trying To Exploit A Windows Kernel Arbitrary Read Vulnerability</title>
      <link>https://starlabs.sg/blog/2022/06-trying-to-exploit-a-windows-kernel-arbitrary-read-vulnerability/</link>
      <pubDate>Tue, 07 Jun 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/06-trying-to-exploit-a-windows-kernel-arbitrary-read-vulnerability/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;I recently discovered a very interesting kernel vulnerability that allows the reading of arbitrary kernel-mode address. Sadly, the vulnerability was patched in Windows 21H2 (OS Build 22000.675), and I am unsure of the CVE being assigned to it. In this short blog post, I will share my journey of trying to exploit this vulnerability. Although I didn&amp;rsquo;t finish the exploit in the end, I have decided to share this with everyone anyway. This is also my attempt to find an answer based on this &lt;a href=&#34;https://twitter.com/jonasLyk/status/1506393490598637568&#34;&gt;discussion&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Wine in Old Bottle - Microsoft Sharepoint Post-Auth Deserialization RCE (CVE-2022-29108)</title>
      <link>https://starlabs.sg/blog/2022/05-new-wine-in-old-bottle-microsoft-sharepoint-post-auth-deserialization-rce-cve-2022-29108/</link>
      <pubDate>Thu, 12 May 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/05-new-wine-in-old-bottle-microsoft-sharepoint-post-auth-deserialization-rce-cve-2022-29108/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;Recently, I have had a some work which is related to Sharepoint, so I was learning on how to setup and debug old bugs of Sharepoint.&lt;/p&gt;&#xA;&lt;p&gt;In February, there was a Deserialization bug CVE-2022-22005 (post-auth of course). There is already a detailed analysis blog post about that written by a Vietnamese guy (&lt;a href=&#34;https://blog.viettelcybersecurity.com/cve-2022-22005-microsoft-sharepoint-rce/&#34;&gt;here&lt;/a&gt;). The blog is written with great enthusiasm and detail. I also rely on the details in that blog to setup and debug. And because the bug written in this article will be related to it, I recommend you read through the article above once to easily understand this article!&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Journey of Hunting macOS Kernel Vulnerabilities</title>
      <link>https://starlabs.sg/publications/a-journey-of-hunting-macos-kernel-vulnerabilities/</link>
      <pubDate>Thu, 21 Apr 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/a-journey-of-hunting-macos-kernel-vulnerabilities/</guid>
      <description>&lt;p&gt;Talk delivered at Zer0Con 2022 (Seoul, April 2022). The presentation walks through a sustained effort to find exploitable vulnerabilities in the macOS kernel, covering target selection, code review methodology, fuzzer design, and a discussion of the patches that resulted.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/Zer0Con%202022/A%20Journey%20Of%20Hunting%20macOS%20kernel.pptx&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Case Study of an Incorrect Bitwise AND Optimization in V8</title>
      <link>https://starlabs.sg/publications/a-case-study-of-an-incorrect-bitwise-and-optimization-in-v8/</link>
      <pubDate>Wed, 06 Apr 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/a-case-study-of-an-incorrect-bitwise-and-optimization-in-v8/</guid>
      <description>&lt;p&gt;Talk delivered at the NUS GreyHats Security Wednesday series (April 2022). A deep dive into CVE-2021-30599, an incorrect bitwise AND optimization in V8&amp;rsquo;s JIT compiler. The presentation covers how the compiler miscompilation was discovered, how it can be turned into a type confusion primitive, and what the broader takeaway is for auditing JIT compilers.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/NUS%20GreyHats%20SecWed%20Apr%202021/A%20case%20study%20of%20an%20incorrect%20bitwise%20and%20optimization%20in%20V8/CVE-2021-30599_official.pptx&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>An Introduction to Manual Source Code Review</title>
      <link>https://starlabs.sg/publications/an-introduction-to-manual-source-code-review/</link>
      <pubDate>Wed, 06 Apr 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/an-introduction-to-manual-source-code-review/</guid>
      <description>&lt;p&gt;Talk delivered at the NUS GreyHats Security Wednesday series (April 2022). The session introduces a structured approach to manual source code review: how to identify trust boundaries, trace data flows, and focus attention on the components most likely to harbour exploitable bugs — the things automated scanners consistently miss.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/NUS%20GreyHats%20SecWed%20Apr%202021/Introduction%20to%20Manual%20Source%20Code%20Review/Introduction%20to%20Manual%20Source%20Code%20Review.pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-4206) QEMU QXL Integer overflow leads to Heap Overflow</title>
      <link>https://starlabs.sg/advisories/21/21-4206/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-4206/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-4206&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;QEMU &amp;lt; v6.0.0&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.qemu.org/&#34;&gt;https://www.qemu.org/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;h2 id=&#34;technical-details&#34;&gt;Technical Details&lt;/h2&gt;&#xA;&lt;p&gt;QXL, the QEMU QXL video accelerator, is a para-virtualized framebuffer device for the SPICE protocol. It is the default video device when we create a VM from virt-manager. It exposes the RAMs and I/O ports to let guest communicate with it.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;00:01.0 VGA compatible controller: Red Hat, Inc. QXL paravirtual graphic card (rev 04) (prog-if 00 [VGA controller])&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Subsystem: Red Hat, Inc. QEMU Virtual Machine&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Flags: fast devsel, IRQ 21&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Memory at f4000000 (32-bit, non-prefetchable) [size=64M]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Memory at f8000000 (32-bit, non-prefetchable) [size=64M]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Memory at fcc14000 (32-bit, non-prefetchable) [size=8K]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        I/O ports at c040 [size=32]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Expansion ROM at 000c0000 [disabled] [size=128K]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Kernel driver in use: qxl&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Kernel modules: qxl&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;On its RAMs, QXL implements different rings for different purposes. The space &lt;code&gt;cursor&lt;/code&gt; points to the device RAMs, which means the guest controls its content. In &lt;code&gt;cursor_ring&lt;/code&gt;, the guest can push a cursor command to tell the video driver how to render a cursor or where to place the cursor. After we push a command and notify the device to handle the command, the function &lt;code&gt;qxl_cursor&lt;/code&gt; will be called. It will use &lt;code&gt;cursor-&amp;gt;header.width&lt;/code&gt; and &lt;code&gt;cursor-&amp;gt;header.height&lt;/code&gt; to allocate enough space for forward use.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-4207) QEMU QXL Integer overflow leads to Heap Overflow</title>
      <link>https://starlabs.sg/advisories/21/21-4207/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-4207/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-4207&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;QEMU &amp;lt; v6.0.0&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.qemu.org/&#34;&gt;https://www.qemu.org/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;h2 id=&#34;technical-details&#34;&gt;Technical Details&lt;/h2&gt;&#xA;&lt;p&gt;QXL, the QEMU QXL video accelerator, is a para-virtualized framebuffer device for the SPICE protocol. It is the default video device when we create a VM from virt-manager. It exposes the RAMs and I/O ports to let guest communicate with it.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;00:01.0 VGA compatible controller: Red Hat, Inc. QXL paravirtual graphic card (rev 04) (prog-if 00 [VGA controller])&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Subsystem: Red Hat, Inc. QEMU Virtual Machine&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Flags: fast devsel, IRQ 21&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Memory at f4000000 (32-bit, non-prefetchable) [size=64M]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Memory at f8000000 (32-bit, non-prefetchable) [size=64M]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Memory at fcc14000 (32-bit, non-prefetchable) [size=8K]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        I/O ports at c040 [size=32]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Expansion ROM at 000c0000 [disabled] [size=128K]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Kernel driver in use: qxl&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        Kernel modules: qxl&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;On its RAMs, QXL implements different rings for different purposes. The space &lt;code&gt;cursor&lt;/code&gt; points are device RAMs, which means the guest controls its content. In &lt;code&gt;cursor_ring&lt;/code&gt;, the guest can push a cursor command to tell the video driver how to render a cursor or where to place the cursor. After we push a command and notify the device to handle the command, the function &lt;code&gt;qxl_cursor&lt;/code&gt; will be called. It will fetch &lt;code&gt;cursor-&amp;gt;header.width&lt;/code&gt; and &lt;code&gt;cursor-&amp;gt;header.height&lt;/code&gt; to allocate enough space for forward use.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-0168) Linux Kernel smb2_ioctl_query_info NULL Pointer Dereference</title>
      <link>https://starlabs.sg/advisories/22/22-0168/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-0168/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2022-0168&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Linux kernels 5.4–5.12, 5.13-rc+HEAD&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Common Internet File System (CIFS) is a network filesystem protocol used for providing shared access to files and printers between machines on the network. A CIFS client application can read, write, edit and even remove files on the remote server. Linux can use the ioctl system call on CIFS file for query information. In the function &lt;code&gt;smb2_ioctl_query_info&lt;/code&gt;, it incorrectly verify the return from the &lt;code&gt;memdup_user&lt;/code&gt; function [2].&#xA;&lt;code&gt;qi.output_buffer_length&lt;/code&gt; is grabbing from copy_from_user [1] which is user control value. If qi.output_buffer_length is equal to zero, the &lt;code&gt;memdup_user&lt;/code&gt; function returns &lt;code&gt;0x10&lt;/code&gt;, which is not a valid ptr but can pass the check in [3].&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-0216) QEMU LSI SCSI Use After Free</title>
      <link>https://starlabs.sg/advisories/22/22-0216/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-0216/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2022-0216&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;QEMU &amp;lt; v6.0.0&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.qemu.org/&#34;&gt;https://www.qemu.org/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;h2 id=&#34;technical-details&#34;&gt;Technical Details&lt;/h2&gt;&#xA;&lt;p&gt;The vulnerability resides in the &lt;code&gt;hw/scsi/lsi53c895a.c&lt;/code&gt; specifically in &lt;code&gt;lsi_do_msgout&lt;/code&gt; function. &lt;code&gt;lsi_do_msgout&lt;/code&gt; function is used to receive messages from the OS, and do something based on that message. In this case, one message only has one-byte size.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-c&#34; data-lang=&#34;c&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#ff7b72&#34;&gt;static&lt;/span&gt; &lt;span style=&#34;color:#ff7b72&#34;&gt;void&lt;/span&gt; &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;lsi_do_msgout&lt;/span&gt;(LSIState &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;*&lt;/span&gt;s)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;{&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#ff7b72&#34;&gt;uint8_t&lt;/span&gt; msg;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#ff7b72&#34;&gt;int&lt;/span&gt; len;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#ff7b72&#34;&gt;uint32_t&lt;/span&gt; current_tag;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    lsi_request &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;*&lt;/span&gt;current_req, &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;*&lt;/span&gt;p, &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;*&lt;/span&gt;p_next;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#ff7b72&#34;&gt;if&lt;/span&gt; (s&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;current) {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        current_tag &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; s&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;current&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;tag;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        current_req &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; s&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;current; &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;// [1]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&lt;/span&gt;    } &lt;span style=&#34;color:#ff7b72&#34;&gt;else&lt;/span&gt; {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        current_tag &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; s&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;select_tag;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        current_req &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;lsi_find_by_tag&lt;/span&gt;(s, current_tag);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    }&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;trace_lsi_do_msgout&lt;/span&gt;(s&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;dbc);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#ff7b72&#34;&gt;while&lt;/span&gt; (s&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;dbc) { &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;// s-&amp;gt;dbc is controlled&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&lt;/span&gt;        msg &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;lsi_get_msgbyte&lt;/span&gt;(s);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        s&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;sfbr &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; msg;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#ff7b72&#34;&gt;switch&lt;/span&gt; (msg) {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;...&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#ff7b72&#34;&gt;case&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;0x0d&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;:&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;/* The ABORT TAG message clears the current I/O process only. */&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;trace_lsi_do_msgout_abort&lt;/span&gt;(current_tag);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ff7b72&#34;&gt;if&lt;/span&gt; (current_req) { &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;// current_req = s-&amp;gt;current&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&lt;/span&gt;                &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;scsi_req_cancel&lt;/span&gt;(current_req&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;req); &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;// [1] cancel scsi request, s-&amp;gt;current will be freed and s-&amp;gt;current = NULL&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&lt;/span&gt;            }&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;lsi_disconnect&lt;/span&gt;(s);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ff7b72&#34;&gt;break&lt;/span&gt;;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;...&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        }&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    }&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#ff7b72&#34;&gt;return&lt;/span&gt;;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#79c0ff;font-weight:bold&#34;&gt;bad&lt;/span&gt;:&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;qemu_log_mask&lt;/span&gt;(LOG_UNIMP, &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;Unimplemented message 0x%02x&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\n&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;&lt;/span&gt;, msg);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;lsi_set_phase&lt;/span&gt;(s, PHASE_MI);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;lsi_add_msg_byte&lt;/span&gt;(s, &lt;span style=&#34;color:#a5d6ff&#34;&gt;7&lt;/span&gt;); &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;/* MESSAGE REJECT */&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    s&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;msg_action &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; LSI_MSG_ACTION_COMMAND;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;code&gt;s-&amp;gt;current&lt;/code&gt; is &lt;code&gt;lsi_request&lt;/code&gt; object which is created and allocated every time we request SCSI command from OS. Using &lt;code&gt;lsi_do_msgout&lt;/code&gt;, we can cancel the current SCSI request by calling the &lt;code&gt;lsi_do_msgout&lt;/code&gt; function and sending &lt;code&gt;0x0d&lt;/code&gt; message. By sending &lt;code&gt;0x0d&lt;/code&gt; message in &lt;code&gt;lsi_do_msgout&lt;/code&gt; function, it will call &lt;code&gt;scsi_req_cancel&lt;/code&gt; with &lt;code&gt;current_req-&amp;gt;req&lt;/code&gt; as argument. The problem is that after the SCSI request is canceled, &lt;code&gt;s-&amp;gt;current&lt;/code&gt; will be freed, but &lt;code&gt;current_req&lt;/code&gt; is not null-ed which will point to the freed buffer. Because &lt;code&gt;current_req&lt;/code&gt; is freed, by sending the next message byte with &lt;code&gt;0x0d&lt;/code&gt; again. &lt;code&gt;current_req-&amp;gt;req&lt;/code&gt; will have an invalid value and can lead to undefined behavior or crash.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Vancouver 2022: Master of Pwn</title>
      <link>https://starlabs.sg/achievements/pwn2own-vancouver-2022-master-of-pwn/</link>
      <pubDate>Tue, 22 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-vancouver-2022-master-of-pwn/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2022/1/12/pwn2own-vancouver-2022-luanch&#34;&gt;2022 spring edition of Pwn2Own (Pwn2Own Vancouver)&lt;/a&gt; was held from 18th March to 20th March 2022 in a hybrid format where participants are back to competing in-person and in virtual due to the ongoing COVID-19 pandemic that has limited some contestants&amp;rsquo; traveling operations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-28730) Apache JSPWiki v2.11.1 - Reflected XSS in AjaxPreview.jsp</title>
      <link>https://starlabs.sg/advisories/22/22-28730/</link>
      <pubDate>Mon, 14 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-28730/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2022-28730&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Latest release &lt;a href=&#34;https://github.com/apache/jspwiki/releases/tag/2.11.2&#34;&gt;v2.11.2&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSSv3.1 Base Score&lt;/strong&gt;: 5.4 (Medium)&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVSSv3.1 String&lt;/strong&gt;: &lt;code&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://github.com/apache/jspwiki/&#34;&gt;https://github.com/apache/jspwiki/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Due to the lack of sanitzation before displaying the rendered preview to the user resulted in a Reflected XSS vulnerability at the &lt;code&gt;AJAXPreview.jsp&lt;/code&gt; end-point. As a result, an unauthenticated attacker is able to execute arbitrary JavaScript code by deceiving an authenticated Admin user to trigger a specially crafted payload, resulting in potential state-changing actions being carried out.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-26718) macOS smbfs Out-of-Bounds Read due to parse nic info</title>
      <link>https://starlabs.sg/advisories/22/22-26718/</link>
      <pubDate>Fri, 04 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-26718/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2022-26718&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;macOS 11.x.x &amp;lt;= 11.6.4&lt;/li&gt;&#xA;&lt;li&gt;macOS 12.x.x &amp;lt;= 12.2.1&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.apple.com/&#34;&gt;https://www.apple.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;code&gt;smbfs&lt;/code&gt; stands for Samba file system of macOS, which is used for communication and linking with Samba file server. &lt;code&gt;smbfs&lt;/code&gt; allows users to connect a remote shared folder to Finder.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;smbfs&lt;/code&gt; is a macOS driver containing two components one is netsmb and the other one is smbfs, this driver also has public open source at this link but it is only available for macOS 11.5.&#xA;netsmb is used to setup authentication, do initialization, send and receive data from SMB file server.&#xA;&lt;code&gt;smbfs&lt;/code&gt; was implemented as a filesystem handler for accessing from local users such as: open, read, write, copy operations in client machines.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2021 Q4 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-2021-q4-most-valuable-security-researchers/</link>
      <pubDate>Tue, 01 Feb 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2021-q4-most-valuable-security-researchers/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Ngo Wei Lin &lt;strong&gt;(#18)&lt;/strong&gt; was shortlisted for the Q4 2021 Microsoft Most Valuable Security Researchers leaderboard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/2021-Q4-Leaderboard-1-50.png&#34; alt=&#34;MSRC Q4 2021 leaderboard — positions 1–50&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/2021-Q4-Leaderboard-Azure.png&#34; alt=&#34;MSRC Q4 2021 leaderboard — Azure category&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://msrc-blog.microsoft.com/2022/02/01/congratulations-to-the-top-msrc-2021-q4-security-researchers/&#34;&gt;MSRC blog: Top Q4 2021 Security Researchers&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>The Cat Escaped from the Chrome Sandbox</title>
      <link>https://starlabs.sg/blog/2022/01-the-cat-escaped-from-the-chrome-sandbox/</link>
      <pubDate>Fri, 21 Jan 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2022/01-the-cat-escaped-from-the-chrome-sandbox/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;On 13th September 2021, Google &lt;a href=&#34;https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html&#34;&gt;published the security advisory&lt;/a&gt; for Google Chrome. That advisory states that Google is aware of two vulnerabilities exploited in the wild, &lt;strong&gt;CVE-2021-30632&lt;/strong&gt; as RCE and &lt;strong&gt;CVE-2021-30633&lt;/strong&gt; as Sandbox Escape.&lt;/p&gt;&#xA;&lt;p&gt;In this post, I will talk about the bypass sandbox vulnerability &lt;strong&gt;CVE-2021-30633&lt;/strong&gt;. &lt;a href=&#34;https://github.com/m-y-mo&#34;&gt;Man Yue Mo&lt;/a&gt; had published a very detailed &lt;a href=&#34;https://securitylab.github.com/research/in_the_wild_chrome_cve_2021_30632/&#34;&gt;blog post&lt;/a&gt; explaining &lt;strong&gt;CVE-2021-30632&lt;/strong&gt;, which is a Type Confusion bug that leads to RCE in Chrome.&lt;/p&gt;&#xA;&lt;p&gt;In summary, the sandbox bypass is made possible because of a &lt;strong&gt;&lt;code&gt;Use-After-Free (UAF)&lt;/code&gt;&lt;/strong&gt; bug in the &lt;code&gt;IndexedDB&lt;/code&gt; API, chained with a &lt;strong&gt;&lt;code&gt;Out-of-Bounds (OOB) Write&lt;/code&gt;&lt;/strong&gt; bug in V8, and triggered via Mojo IPC connection. As a disclaimer, this is not a bug that I had found. I made this post to help me organise my thoughts to understand the bug and the exploit. I will carry out a root cause analysis of the Sandbox Escape and discuss my observation and understanding of the full-chain exploit.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2022-21877) Storage Spaces Controller Information Disclosure Vulnerability</title>
      <link>https://starlabs.sg/advisories/22/22-21877/</link>
      <pubDate>Tue, 11 Jan 2022 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/22/22-21877/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;Storage Spaces&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Vendor&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Microsoft&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Medium&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Affected Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;spaceport.sys in Windows 10 and Windows Server 2019&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;spaceport.sys in Windows 10 and Windows Server 2019&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;CVE Identifier&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;CVE-2022-21877&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;cvss31-scoring-system&#34;&gt;CVSS3.1 Scoring System&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Base Score:&lt;/strong&gt; 5.5 (Medium)&lt;br&gt;&#xA;&lt;strong&gt;Vector String:&lt;/strong&gt; &lt;code&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&lt;/code&gt;&lt;/p&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Metric&lt;/strong&gt;&lt;/th&gt;&#xA;          &lt;th&gt;&lt;strong&gt;Value&lt;/strong&gt;&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Vector (AV)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Local&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Attack Complexity (AC)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Privileges Required (PR)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Low&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;User Interaction (UI)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Scope (S)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;Unchanged&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Confidentiality (C)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;High&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Integrity (I)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td&gt;&lt;strong&gt;Availability (A)&lt;/strong&gt;&lt;/td&gt;&#xA;          &lt;td&gt;None&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h2 id=&#34;product-overview&#34;&gt;Product Overview&lt;/h2&gt;&#xA;&lt;p&gt;Storage Spaces is a technology in Windows and Windows Server that can help protect your data from drive failures. It is conceptually similar to RAID, implemented in software. You can use Storage Spaces to group three or more drives together into a storage pool and then use capacity from that Pool to create Storage Spaces. These typically store extra copies of your data, so if one of your drives fails, you still have an intact copy of your data. If you run low on capacity, just add more drives to the storage pool.&#xA;By abusing storage pools that are authorized for common users to access, storage space object and tier object. An attacker can set the properties of a tier object to trigger the bug, through which it is possible to leak data in the kernel if the appropriate value is passed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>VM Escape Case Study: VirtualBox Bug Hunting and Exploitation</title>
      <link>https://starlabs.sg/publications/vm-escape-case-study-virtualbox-bug-hunting-and-exploitation/</link>
      <pubDate>Sat, 04 Dec 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/vm-escape-case-study-virtualbox-bug-hunting-and-exploitation/</guid>
      <description>&lt;p&gt;Talk delivered at IDSECCONF 2021 (Indonesia, December 2021). The presentation walks through a complete VM escape case study targeting Oracle VirtualBox: how target areas were selected, how bugs were discovered through code review and dynamic analysis, and how findings were chained into a working exploit.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/IDSECCONF%202021/VM%20Escape%20Case%20Study_%20VirtualBox%20Bug%20Hunting%20and%20Exploitation%20(IDSECCONF%202021).pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Great Escape: A Case Study of VM Escape and EoP Vulnerabilities</title>
      <link>https://starlabs.sg/publications/the-great-escape-a-case-study-of-vm-escape-and-eop-vulnerabilities/</link>
      <pubDate>Fri, 26 Nov 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/publications/the-great-escape-a-case-study-of-vm-escape-and-eop-vulnerabilities/</guid>
      <description>&lt;p&gt;Talk delivered at HITCON 2021 (Taipei, November 2021). The presentation examines how VM escape bugs and host-level elevation-of-privilege vulnerabilities are identified and chained together to achieve full host compromise, drawing on real cases from vulnerability research and competition settings.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/star-sg/Presentations/blob/main/HITCON%202021/The%20Great%20Escape%20-%20A%20Case%20Study%20of%20VM%20Escape%20and%20EoP%20Vulnerabilities(HITCON%202021).pdf&#34;&gt;Slides available on GitHub&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Diving into Open-source LMS Codebases</title>
      <link>https://starlabs.sg/blog/2021/11-diving-into-open-source-lms-codebases/</link>
      <pubDate>Tue, 16 Nov 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2021/11-diving-into-open-source-lms-codebases/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;Looking to practice on source code review, I had been diving into how open-source LMS codebases are structured in order to find undiscovered vulnerabilities. Initially, my main focus had been on &lt;a href=&#34;https://chamilo.org/en/&#34;&gt;Chamilo LMS&lt;/a&gt; (their source code can be found on &lt;a href=&#34;https://github.com/chamilo/chamilo-lms&#34;&gt;GitHub&lt;/a&gt;). Afterwards, I looked into &lt;a href=&#34;https://moodle.org/&#34;&gt;Moodle LMS&lt;/a&gt; (their source code can also be found on &lt;a href=&#34;https://github.com/moodle/moodle&#34;&gt;GitHub&lt;/a&gt;).&lt;/p&gt;&#xA;&lt;p&gt;The majority of the findings that were found are the ones you would think of when you hear the words &amp;ldquo;common web application vulnerabilities&amp;rdquo;, such as:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Austin 2021</title>
      <link>https://starlabs.sg/achievements/pwn2own-austin-2021/</link>
      <pubDate>Thu, 04 Nov 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-austin-2021/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2021/8/11/pwn2own-austin-2021-phones-printers-nas-and-more&#34;&gt;2021 fall edition of Pwn2Own (Pwn2Own Austin)&lt;/a&gt; was held from 02nd November to 04th November 2021 in a virtual format due to the ongoing COVID-19 pandemic that has limited many contestants&amp;rsquo; traveling operations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TianFu Cup 2021</title>
      <link>https://starlabs.sg/achievements/tianfu-cup-2021/</link>
      <pubDate>Sun, 17 Oct 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/tianfu-cup-2021/</guid>
      <description>&lt;p&gt;The &lt;strong&gt;TianFu Cup&lt;/strong&gt; International Cyber Security Competition is China&amp;rsquo;s premier hacking competition for security practitioners — modelled after Pwn2Own, with all teams required to use original vulnerabilities to compromise their targets.&lt;/p&gt;&#xA;&lt;p&gt;Billy Jheng Bing-Jhong and Muhammad Alifa Ramdhan successfully pwned QEMU twice — including one entry with a Local Privilege Escalation — and were awarded the Best Demo prize.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/TianFuCup-2021-Results-17102021.png&#34; alt=&#34;TianFu Cup 2021 — results&#34;&gt;&lt;/p&gt;&#xA;&lt;h3 id=&#34;原创漏洞演示复现赛&#34;&gt;原创漏洞演示复现赛&lt;/h3&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/TianFuCup-2021-17102021.jpg&#34; alt=&#34;TianFu Cup 2021 — exploit demonstration&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2021 Q3 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-2021-q3-most-valuable-security-researchers/</link>
      <pubDate>Thu, 14 Oct 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2021-q3-most-valuable-security-researchers/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Ngo Wei Lin &lt;strong&gt;(#27)&lt;/strong&gt; was shortlisted for the Q3 2021 Microsoft Most Valuable Security Researchers leaderboard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/2021-Q3-Leaderboard-draft-1.png&#34; alt=&#34;MSRC Q3 2021 leaderboard&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://msrc-blog.microsoft.com/2021/10/14/congratulations-to-the-top-msrc-2021-q3-security-researchers/&#34;&gt;MSRC blog: Top Q3 2021 Security Researchers&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Analysis of CVE-2021-1758 (CoreText Out-Of-Bounds Read)</title>
      <link>https://starlabs.sg/blog/2021/09-analysis-of-cve-2021-1758-coretext-out-of-bounds-read/</link>
      <pubDate>Tue, 14 Sep 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2021/09-analysis-of-cve-2021-1758-coretext-out-of-bounds-read/</guid>
      <description>&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://starlabs.sg/advisories/21-1758/&#34;&gt;STARLabs Advisory STAR-21-1758&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;In February, &lt;a href=&#34;https://twitter.com/peternguyen14&#34;&gt;Peter&lt;/a&gt; found a OOB read vulnerability in libFontParser.dylib. The latest tested version with the vulnerability is macOS Catalina 10.15.4 (19E287).&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;I wrote a &lt;a href=&#34;https://daniao.ws/notes/macos/macos-on-vmware-fusion&#34;&gt;guide&lt;/a&gt; earlier on setting up a testing environment.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;mac-resource-fork-font-file&#34;&gt;Mac Resource Fork Font File&lt;/h2&gt;&#xA;&lt;p&gt;References:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://fontforge.org/docs/techref/macformats.html&#34;&gt;Font Forge: Macintosh Font Formats&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://developer.apple.com/library/archive/documentation/mac/pdf/MoreMacintoshToolbox.pdf#page=34&#34;&gt;Apple: MoreMacintoshToolbx&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://fonttools.readthedocs.io/en/latest/misc/macRes.html&#34;&gt;fontTools: macRes&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;It turns out that macOS can load something called a Mac Resource Fork font file. Looks like a legacy thing.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-30844) macOS smbfs Out-of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-30844/</link>
      <pubDate>Mon, 13 Sep 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-30844/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-30844&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;macOS BigSur 11.0 - 11.2.3&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://apple.com&#34;&gt;https://apple.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;smbfs is a kext driver which handles SMB connection between the user and SMB Server. This vulnerability occurs in smbfs, which allows an attacker to leak kernel memory to achieve further exploitation.&lt;/p&gt;&#xA;&lt;p&gt;The bug occurs on the &lt;code&gt;SMBIOC_T2RQ&lt;/code&gt; ioctl handler. This handler first process user-mode input on function &lt;code&gt;smb_usr_t2request&lt;/code&gt;&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-cpp&#34; data-lang=&#34;cpp&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#ff7b72&#34;&gt;int&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;smb_usr_t2request&lt;/span&gt;(&lt;span style=&#34;color:#ff7b72&#34;&gt;struct&lt;/span&gt; &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;smb_share&lt;/span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;*&lt;/span&gt;share, &lt;span style=&#34;color:#ff7b72&#34;&gt;struct&lt;/span&gt; &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;smbioc_t2rq&lt;/span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;*&lt;/span&gt;dp, vfs_context_t context)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;{&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;//...&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&lt;/span&gt;&#x9;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;/* ioc_name_len includes the null byte, ioc_kern_name is a c-style string */&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#ff7b72&#34;&gt;if&lt;/span&gt; (dp&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;ioc_kern_name &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; dp&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;ioc_name_len) {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;t2p&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;t_name &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; smb_memdupin(dp&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;ioc_kern_name, dp&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;ioc_name_len);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#ff7b72&#34;&gt;if&lt;/span&gt; (t2p&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&amp;gt;&lt;/span&gt;t_name &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;==&lt;/span&gt; NULL) {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;error &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; ENOMEM;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#ff7b72&#34;&gt;goto&lt;/span&gt; bad;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;//...&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&lt;/span&gt;}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;code&gt;smb_usr_t2request&lt;/code&gt; copy data from user-mode address (dp-&amp;gt;ioc_kern_name) with size is &lt;code&gt;dp-&amp;gt;ioc_name_len&lt;/code&gt; which is controlled by attacker also. Later, this function will build a TCP package from this data and then send it to SMB Server. The field &lt;code&gt;t2p-&amp;gt;t_name&lt;/code&gt; is also included in the TCP package of this function.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-30845) macOS smbfs Out-of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-30845/</link>
      <pubDate>Mon, 13 Sep 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-30845/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-30845&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;macOS BigSur 11.0 - 11.2.3&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://apple.com/&#34;&gt;https://apple.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;code&gt;smbfs&lt;/code&gt; is a kext driver which handles SMB connection between the user and SMB Server. This vulnerability occurs in &lt;code&gt;smbfs&lt;/code&gt;, which allows an attacker to leak kernel memory to achieve further exploitation.&lt;/p&gt;&#xA;&lt;p&gt;The vulnerability exists in the &lt;code&gt;smbfs_mount&lt;/code&gt; function, which can be triggered via &lt;code&gt;mount&lt;/code&gt; syscall. &lt;code&gt;mount&lt;/code&gt; syscall will take data from user input and pass it to &lt;code&gt;smbfs_mount&lt;/code&gt;. &lt;code&gt;smbfs_mount&lt;/code&gt; does not require any privilege to mount and smb to a folder.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2020 Most Valuable Security Researchers (Annual)</title>
      <link>https://starlabs.sg/achievements/msrc-2020-most-valuable-security-researchers-annual/</link>
      <pubDate>Thu, 05 Aug 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2020-most-valuable-security-researchers-annual/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Meysam Firouzi &lt;strong&gt;(#40)&lt;/strong&gt; and Shi Ji &lt;strong&gt;(#54)&lt;/strong&gt; were shortlisted in Microsoft&amp;rsquo;s 2020 annual Most Valuable Security Researchers leaderboard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/MSRC-MVP-2020-Leaderboard.png&#34; alt=&#34;MSRC 2020 Most Valuable Security Researchers leaderboard&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://msrc-blog.microsoft.com/2020/08/05/announcing-2020-msrc-most-valuable-security-researchers/&#34;&gt;MSRC blog: Announcing 2020 MSRC Most Valuable Security Researchers&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Identifying Bugs in Router Firmware at Scale with Taint Analysis</title>
      <link>https://starlabs.sg/blog/2021/08-identifying-bugs-in-router-firmware-at-scale-with-taint-analysis/</link>
      <pubDate>Wed, 04 Aug 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2021/08-identifying-bugs-in-router-firmware-at-scale-with-taint-analysis/</guid>
      <description>&lt;p&gt;In the past few months, Akash and I (&lt;a href=&#34;https://twitter.com/daniellimws&#34;&gt;@daniellimws&lt;/a&gt;) worked on developing a taint analysis tool to find bugs in routers, with the guidance of Shi Ji (&lt;a href=&#34;https://twitter.com/puzzorsj&#34;&gt;@puzzor&lt;/a&gt;) and Thach (&lt;a href=&#34;https://twitter.com/hi_im_d4rkn3ss&#34;&gt;@d4rkn3ss&lt;/a&gt;). We had developed a tool based on &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=dir-878+1.12A1&#34;&gt;CVE-2019-8312 to CVE-2019-8319&lt;/a&gt;, which are command injection vulnerabilities on the D-Link DIR-878 router with firmware version 1.12A1. The goal was to automate the detection of such bugs. Ideally, the tool should be faster than finding the bugs manually.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MSRC 2021 Q2 Most Valuable Security Researchers</title>
      <link>https://starlabs.sg/achievements/msrc-2021-q2-most-valuable-security-researchers/</link>
      <pubDate>Thu, 15 Jul 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/msrc-2021-q2-most-valuable-security-researchers/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/researcher-recognition-program&#34;&gt;MSRC Most Valuable Security Researchers&lt;/a&gt; program offers public recognition to researchers who help protect customers by discovering and sharing security vulnerabilities under &lt;a href=&#34;https://www.microsoft.com/en-us/msrc/cvd&#34;&gt;Coordinated Vulnerability Disclosure&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Lê Hữu Quang Linh &lt;strong&gt;(#24)&lt;/strong&gt; was shortlisted for the Q2 2021 Microsoft Most Valuable Security Researchers leaderboard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/2021-Q2-Leaderboard-draft-2.png&#34; alt=&#34;MSRC Q2 2021 leaderboard&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://msrc-blog.microsoft.com/2021/07/15/announcing-the-top-msrc-2021-q2-security-researchers-congratulations/&#34;&gt;MSRC blog: Top Q2 2021 Security Researchers&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Simple Vulnerability Regression Monitoring with V8Harvest</title>
      <link>https://starlabs.sg/blog/2021/06-simple-vulnerability-regression-monitoring-with-v8harvest/</link>
      <pubDate>Fri, 25 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2021/06-simple-vulnerability-regression-monitoring-with-v8harvest/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;During my research into Javascript Engine (V8), I have created a &lt;a href=&#34;https://github.com/star-sg/V8Harvest&#34;&gt;small tool&lt;/a&gt; to help you view recent V8 bugs that contains regression test on a single page. Since most of the time, regression test often contains PoC to trigger the bug, it’s pretty useful to analyze them to find the root cause and writing exploit for the n-day bug.&lt;/p&gt;&#xA;&lt;p&gt;For example, &lt;a href=&#34;https://chromium.googlesource.com/v8/v8/+/fb0a60e15695466621cf65932f9152935d859447/test/mjsunit/compiler/regress-1053604.js&#34;&gt;regress-1053604.js&lt;/a&gt; contains the PoC to trigger the side-effect in kJSCreate opcode (&lt;strong&gt;CVE-2020-6418&lt;/strong&gt;).&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-30868) macOS smbfs Race Condition leading to Use-After-Free Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-30868/</link>
      <pubDate>Fri, 18 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-30868/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-30868&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;macOS BigSur 11.0 - 11.2.3&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://apple.com/&#34;&gt;https://apple.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;code&gt;smbfs&lt;/code&gt; is a kext driver which handles SMB connection between the user and SMB Server. This vulnerability occurs in &lt;code&gt;smbfs&lt;/code&gt;, which allows attacker can escalate from user permission into root privilege.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;smbfs&lt;/code&gt; kext was implemented with chardev device styles. User can interact with smbfs kext via &lt;strong&gt;ioctl&lt;/strong&gt; syscall to do some task.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;smbfs&lt;/code&gt; only load when the user first connects to the SMB server. After that, the attacker can easily load it with user privilege via &lt;strong&gt;&lt;code&gt;NetFSMountURLSync&lt;/code&gt;&lt;/strong&gt; from NetFS Framework.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35400) Prolink PRC2402M mesh.cgi get_extender_page Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35400/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35400/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35400&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;mesh.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;popen&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;No authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes GET requests to interact with the cgi scripts. To access the vulnerable script, visit http://localhost/cgi-bin/mesh.cgi.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35401) Prolink PRC2402M login.cgi sys_login Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35401/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35401/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35401&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;login.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;popen&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;No authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes POST requests through HTML forms to interact with the cgi scripts. To access the vulnerable script, visit &lt;code&gt;http://localhost/cgi-bin/login.cgi&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35403) Prolink PRC2402M touchlist_sync.cgi main Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35403/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35403/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35403&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;touchlist_sync.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;popen&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;No authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes GET requests to interact with the cgi scripts. To access the vulnerable script, visit &lt;code&gt;http://localhost/cgi-bin/touchlist_sync.cgi&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35404) Prolink PRC2402M applogin.cgi sys_login1 Authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35404/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35404/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35404&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;applogin.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;system&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;Authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes GET requests through HTML forms to interact with the cgi scripts. To access the vulnerable script, visit http://localhost/cgi-bin/applogin.cgi.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35406) Prolink PRC2402M login.cgi sys_login1 Authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35405/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35405/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35406&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;applogin.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;system&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;Authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes POST requests through HTML forms to interact with the cgi scripts. To access the vulnerable script, visit &lt;code&gt;http://localhost/cgi-bin/login.cgi&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35406) Prolink PRC2402M qos.cgi qos_settings Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35406/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35406/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35406&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;qos.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;system&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;No authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes POST requests through HTML forms to interact with the cgi scripts. To access the vulnerable script, visit http://localhost/cgi-bin/qos.cgi.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35407) Prolink PRC2402M mesh.cgi get_upgrade_page Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35407/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35407/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35407&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;mesh.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;popen&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;No authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes GET requests to interact with the cgi scripts. To access the vulnerable script, visit http://localhost/cgi-bin/mesh.cgi.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35409) Prolink PRC2402M nightled.cgi SetNightLed Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35409/</link>
      <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35409/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35409&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;nightled.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;system&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;No authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes GET requests to interact with the cgi scripts. To access the vulnerable script, visit http://localhost/cgi-bin/nightled.cgi.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-30836) WebKit WebCore::AudioNode::disconnect null pointer reference</title>
      <link>https://starlabs.sg/advisories/21/21-30836/</link>
      <pubDate>Wed, 09 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-30836/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-30836&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;webkitGTK2.32.0&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://webkit.org/&#34;&gt;https://webkit.org/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;In order to show how we can reproduce it, let&amp;rsquo;s open poc.html in webkitgtk version 2.32.0 within Ubuntu.&lt;/p&gt;&#xA;&lt;p&gt;Alternatively, you may want to use my docker script to build.&#xA;Source code of &lt;code&gt;build.sh&lt;/code&gt;&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;docker build . -t webkit_asan&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;docker run -it  --name=webkit2.32.0 webkit_asan /bin/bash&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Source code of &lt;code&gt;Dockerfile&lt;/code&gt;&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-gdscript3&#34; data-lang=&#34;gdscript3&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;FROM ubuntu:&lt;span style=&#34;color:#a5d6ff&#34;&gt;18.04&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;MAINTAINER mipu94&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN echo &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;$&lt;/span&gt;{WEBKIT_VERSION}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ARG DEBIAN_FRONTEND&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;noninteractive&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN apt&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;get &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;y update &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    apt&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;get install &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;y wget \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    cmake \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    bison \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    git \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    unzip \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    xz&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;utils \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    apache2 \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    llvm&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;7&lt;/span&gt; \ &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    clang&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;7&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    libclang&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;7&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;dev \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    tzdata \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    sed \ &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    ruby&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;WORKDIR &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;root&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# install ninja&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN wget https:&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;//&lt;/span&gt;github&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;com&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;ninja&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;build&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;ninja&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;releases&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;download&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;v1&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;10.0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;ninja&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;linux&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;zip \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; unzip ninja&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;linux&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;zip \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; mv ninja &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;usr&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;local&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;bin&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; rm ninja&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;linux&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;zip&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# install clang&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN wget https:&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;//&lt;/span&gt;prereleases&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;llvm&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;org&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;10.0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;rc3&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;clang&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;llvm&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;10.0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;rc3&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;x86_64&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;linux&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;gnu&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;ubuntu&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;18.04&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;tar&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;xz \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; tar xvf clang&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;llvm&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;10.0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;rc3&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;x86_64&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;linux&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;gnu&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;ubuntu&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;18.04&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;tar&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;xz \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; mv clang&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;llvm&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;10.0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;rc3&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;x86_64&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;linux&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;gnu&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;ubuntu&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;18.04&lt;/span&gt; clang&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ENV WEBKIT_VERSION&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;2.32.0&amp;#34;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    FUZZ_TYPE&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;address&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN  apt&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;get update &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;--&lt;/span&gt;fix&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;missing&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# download webkit&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN wget https:&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;//&lt;/span&gt;webkitgtk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;org&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;releases&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;webkitgtk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-$&lt;/span&gt;{WEBKIT_VERSION}&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;tar&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;xz &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    tar xvf webkitgtk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-$&lt;/span&gt;{WEBKIT_VERSION}&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;tar&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;xz &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    cd webkitgtk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-$&lt;/span&gt;{WEBKIT_VERSION} &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    printf &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#39;y&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\n&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#39;&lt;/span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;|&lt;/span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;./&lt;/span&gt;Tools&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;gtk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;install&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;dependencies &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;WORKDIR &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;root&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;webkitgtk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-$&lt;/span&gt;{WEBKIT_VERSION}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# patch asan build&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;#address, memory&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ENV ASAN_TYPE&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;address  &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN sed &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;i &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#39;s~COMMAND CC=${CMAKE_C_COMPILER} CFLAGS=-Wno-deprecated-declarations LDFLAGS=~COMMAND CC=${CMAKE_C_COMPILER} CFLAGS=&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\\\&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;-Wno-deprecated-declarations -fsanitize=address&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\\\&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt; LDFLAGS=&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\\\&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;-fsanitize=address&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\\\&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;~g&amp;#39;&lt;/span&gt; Source&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;WebKit&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;PlatformGTK&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;cmake&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN sed &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;i &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#39;s~COMMAND CC=${CMAKE_C_COMPILER} CFLAGS=-Wno-deprecated-declarations~COMMAND CC=${CMAKE_C_COMPILER} CFLAGS=&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\\\&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;-Wno-deprecated-declarations -fsanitize=address&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\\\&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;~g&amp;#39;&lt;/span&gt; Source&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;WebKit&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;PlatformGTK&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;cmake&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN sed &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;i &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#39;s~LDFLAGS=&amp;#34;${INTROSPECTION_ADDITIONAL_LDFLAGS}&amp;#34;~LDFLAGS=&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\\\&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;${INTROSPECTION_ADDITIONAL_LDFLAGS} -fsanitize=address&lt;/span&gt;&lt;span style=&#34;color:#79c0ff&#34;&gt;\\\&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;~g&amp;#39;&lt;/span&gt; Source&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;WebKit&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;PlatformGTK&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;cmake&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ENV CC&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;$BUILD_PATH/clang/bin/clang&amp;#34;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      CXX&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;$BUILD_PATH/clang/bin/clang++&amp;#34;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      CFLAGS&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;-fsanitize=$ASAN_TYPE&amp;#34;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      CXXFLAGS&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;-fsanitize=$ASAN_TYPE&amp;#34;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      LDFLAGS&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;-fsanitize=$ASAN_TYPE&amp;#34;&lt;/span&gt; \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      ASAN_OPTIONS&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;detect_leaks=0&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN mkdir mybuild &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; cd mybuild &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; cmake \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DCMAKE_BUILD_TYPE&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;Release  \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DCMAKE_INSTALL_PREFIX&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=/&lt;/span&gt;usr \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DCMAKE_SKIP_RPATH&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;ON       \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DPORT&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;GTK                  \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DLIB_INSTALL_DIR&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=/&lt;/span&gt;usr&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;lib  \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DUSE_LIBHYPHEN&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;OFF         \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DENABLE_MINIBROWSER&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;ON     \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DENABLE_GAMEPAD&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;OFF        \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DUSE_WOFF2&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;OFF             \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DUSE_WPE_RENDERER&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;OFF      \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DENABLE_BUBBLEWRAP_SANDBOX&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;OFF \&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;Wno&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;dev &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;G Ninja &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DCMAKE_C_COMPILER&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;/root/clang/bin/clang&amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;DCMAKE_CXX_COMPILER&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;/root/clang/bin/clang++&amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;..&lt;/span&gt; &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; ninja &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&amp;amp;&lt;/span&gt; ninja install&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RUN cp &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt;rf mybuild &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;root&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;/&lt;/span&gt;webkitASAN&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;CMD [&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;/bin/bash&amp;#34;&lt;/span&gt;]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-gdscript3&#34; data-lang=&#34;gdscript3&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# ./build.sh&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# export DISPLAY=:1000&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# Xvfb :1000 -screen 0 1920x1080x24 &amp;amp;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# DISPLAY=:1000 LD_LIBRARY_PATH=/root/webkitASAN/lib /root/webkitASAN/bin/MiniBrowser ~/poc.html&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;In order to understand the root cause of this, let&amp;rsquo;s take a deeper look at the &lt;code&gt;poc.html&lt;/code&gt;&#xA;Source code of &lt;code&gt;poc.html&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-20221-35402) Prolink PRC2402M live_api.cgi satellist_list Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35402/</link>
      <pubDate>Wed, 09 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35402/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35402&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;live_api.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;system&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the Prolink PRC2402M router.&lt;/p&gt;&#xA;&lt;p&gt;No authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes GET requests to interact with the cgi scripts. To access the vulnerable script, visit http://localhost/cgi-bin/live_api.cgi.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-35408) Prolink PRC2402M qos.cgi qos_sta_settings Un-authenticated Command Injection Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-35408/</link>
      <pubDate>Tue, 08 Jun 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-35408/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-35408&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Prolink PRC2402M 20190909&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://prolink2u.com/&#34;&gt;https://prolink2u.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability is present as there are no checks on user input taken by &lt;strong&gt;&lt;code&gt;qos.cgi&lt;/code&gt;&lt;/strong&gt;, which is passed to &lt;code&gt;system&lt;/code&gt;, allowing an attacker to execute arbitrary code in the context of the root user on affected installations of the &lt;strong&gt;Prolink PRC2402M&lt;/strong&gt; router.&lt;/p&gt;&#xA;&lt;p&gt;No authentication is required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The router makes POST requests through HTML forms to interact with the cgi scripts. To access the vulnerable script, visit &lt;code&gt;http://prc2402m.setup/cgi-bin/qos.cgi&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0956) Android NFC Out-Of-Bounds Write due to increase mNumTechList without bounds checking</title>
      <link>https://starlabs.sg/advisories/21/21-0956/</link>
      <pubDate>Fri, 28 May 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0956/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0956&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;RQ1A.210205.004&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.android.com/&#34;&gt;https://www.android.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;There is a Out-Of-Bounds Write problem found in &lt;strong&gt;&lt;code&gt;libnfc_nci_jni.so&lt;/code&gt;&lt;/strong&gt;, within the NFC endpoints discovering and activation. Specifically, in file &lt;em&gt;packages/apps/Nfc/nci/jni/NfcTag.cpp&lt;/em&gt;, function &lt;code&gt;NfcTag::discoverTechnologies (activation)&lt;/code&gt;, when a new NFC endpoint is actived, its information is append to some arrays. Since there is no bound check when append data, it may result in a Out-of-bounds Write vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;When the NFC service is operating on Reader/Writer mode, it has ability to discover Remote NFC Endpoints. While polling, if the NFCC discovers more than one Remote NFC Endpoint, or a Remote NFC Endpoint that supports more than one RF Protocol, NFC Controller start sending &lt;em&gt;RF_DISCOVER_NTF&lt;/em&gt; messages to the Device Host for each endpoint and each RF protocol.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-30745) Apple macOS QuartzCore Type Confusion Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-30745/</link>
      <pubDate>Thu, 20 May 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-30745/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-30745&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;macOS Catalina 10.15.5 (19F101)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://apple.com&#34;&gt;https://apple.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability exists in QuartzCore Framework, which is used by &lt;code&gt;_windowserver&lt;/code&gt; process that allows other applications to interact with OS by mach message that allows attacker can bypass sandbox to get system privilege on the victim&amp;rsquo;s computer.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;_windowserver&lt;/code&gt; is a process run as higher privilege act as a server to receive any messages from other applications and handle some system privilege actions for them.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0204) Juniper Junos OS Local Privilege Escalation vulnerability in dexp</title>
      <link>https://starlabs.sg/advisories/21/21-0204/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0204/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0204&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://juniper.net&#34;&gt;https://juniper.net&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;On the Juniper OS, there are a few binaries that have the &lt;strong&gt;&lt;code&gt;setuid&lt;/code&gt;&lt;/strong&gt; permission bit enabled. These binaries will run as the owner of the executable (typically as &lt;strong&gt;“root”&lt;/strong&gt;) and inherit their privileges. Hence, these binary files can be used to escalate privileges to disclose sensitive information or execute arbitrary command as &lt;strong&gt;root&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0223) Juniper Junos OS Local Privilege Escalation vulnerability in telnetd</title>
      <link>https://starlabs.sg/advisories/21/21-0223/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0223/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0223&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.juniper.net/&#34;&gt;https://www.juniper.net/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;On the Juniper OS, there are a few binaries that have the &lt;strong&gt;&lt;code&gt;setuid&lt;/code&gt;&lt;/strong&gt; permission bit enabled. These binaries will run as the owner of the executable (typically as &lt;strong&gt;“root”&lt;/strong&gt;) and inherit their privileges. Hence, these binary files can be used to escalate privileges to disclose sensitive information or execute arbitrary command as &lt;strong&gt;root&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0254) Junos OS overlayd service bss Buffer Overflow</title>
      <link>https://starlabs.sg/advisories/21/21-0254/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0254/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0254&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.juniper.net/&#34;&gt;https://www.juniper.net/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;overlayd&lt;/strong&gt; is a service that handles Overlay OAM Packet send to Juniper device. This service runs as root by default when the device starts and listens to the UDP connection on port 4789. Port 4789 is exposed to the internet, and everyone can connect to this port and send data.&#xA;The specific flaw exists within the parsing packet function in the &lt;strong&gt;overlayd&lt;/strong&gt; service. The issue results from the lack of proper validation of the size of the buffer before copying this data to a bss buffer, which can lead to bss overflow. Unauthenticated attackers can send specially crafted packets to trigger this vulnerability and resulting in remote code execution on the device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0255) Juniper Junos OS Local Privilege Escalation vulnerability in ethtraceroute</title>
      <link>https://starlabs.sg/advisories/21/21-0255/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0255/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0255&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.juniper.net/&#34;&gt;https://www.juniper.net/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;On the Juniper OS, there are a few binaries that have the &lt;strong&gt;&lt;code&gt;setuid&lt;/code&gt;&lt;/strong&gt; permission bit enabled. These binaries will run as the owner of the executable (typically as &lt;strong&gt;“root”&lt;/strong&gt;) and inherit their privileges. Hence, these binary files can be used to escalate privileges to disclose sensitive information or execute arbitrary command as &lt;strong&gt;root&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0256) Juniper Junos OS Local Privilege Escalation vulnerability in mosquitto</title>
      <link>https://starlabs.sg/advisories/21/21-0256/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0256/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0256&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Junos OS 15.1 to 20.4R1 (Tested on Juniper MX960 device)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.juniper.net/&#34;&gt;https://www.juniper.net/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;On the Juniper OS, there are a few binaries that have the &lt;strong&gt;&lt;code&gt;setuid&lt;/code&gt;&lt;/strong&gt; permission bit enabled. These binaries will run as the owner of the executable (typically as &lt;strong&gt;“root”&lt;/strong&gt;) and inherit their privileges. Hence, these binary files can be used to escalate privileges to disclose sensitive information or execute arbitrary command as &lt;strong&gt;root&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>You Talking To Me?</title>
      <link>https://starlabs.sg/blog/2021/04-you-talking-to-me/</link>
      <pubDate>Mon, 12 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2021/04-you-talking-to-me/</guid>
      <description>&lt;h1 id=&#34;what-is-webdriver-and-how-does-it-work&#34;&gt;What is WebDriver and How does it work?&lt;/h1&gt;&#xA;&lt;p&gt;WebDriver is a protocol used for web browser automation. It can drive a browser to perform various tests on web pages as if a real user was navigating through them. It allows simulating user actions such as clicking links, entering text and submitting forms, which can help test if your website is working as intended. It is usually used for front-end testing and web crawling in a headless environment. WebDriver clients (such as Selenium WebDriver) interact with WebDriver servers (e.g. chromedriver, geckodriver) to launch and control browsers. In Capture-the-Flag (CTF) competitions, WebDriver clients are often used to play the role of a victim user (aka. XSS bot) and simulate user interactions to trigger player-supplied XSS payload.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Vancouver 2021</title>
      <link>https://starlabs.sg/achievements/pwn2own-vancouver-2021/</link>
      <pubDate>Fri, 09 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-vancouver-2021/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2021/1/25/announcing-pwn2own-vancouver-2021&#34;&gt;2021 spring edition of Pwn2Own (Pwn2Own Vancouver)&lt;/a&gt; was held from 07th April to 09th April 2021 in a virtual format due to the ongoing COVID-19 pandemic that has limited many contestants&amp;rsquo; traveling operations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-2321) Oracle VirtualBox E1000 BSS Out-Of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-2321/</link>
      <pubDate>Tue, 06 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-2321/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-2321&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.1.18 revision r142142&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.virtualbox.org/&#34;&gt;https://www.virtualbox.org/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;When the e1000 driver is sending data to e1000 device, it will send frame by frame, there are context frame and data frame, usually one context frame followed by one or multiple data frames. We can prepare by setting TDH (Transfer Head), TDBAL (first 32 bit physical address of frames), TDBAH (last 32 bit physical address of frame) register, We can make device doing transfer by writing TDT (Transfer Tail) register and then will call e1kXmitPending to do the transfer.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-3409) QEMU Heap Overflow in SDHCI Component</title>
      <link>https://starlabs.sg/advisories/21/21-3409/</link>
      <pubDate>Tue, 23 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-3409/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-3409&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;QEMU version under 5.2.50&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.qemu.org/&#34;&gt;https://www.qemu.org/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;QEMU version 5.2.50 is susceptible to vulnerabilities which, when successfully exploited, could lead to the disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS).&lt;/p&gt;&#xA;&lt;p&gt;SDHCI is Secure Digital Host Controller Interface. Secure Digital is a proprietary non-volatile memory card format developed by the SD Association (SDA) for portable devices. SDHCI code in QEMU is SD Controller emulation implementation based on SD Host Controller Specification Ver2.0 by Technical Committee SD Association.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-34978) NETGEAR R6260 setupwizard.cgi Buffer Overflow Unauthenticated Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/21/21-34978/</link>
      <pubDate>Mon, 22 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-34978/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-34978&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;NETGEAR R6260 V1.1.0.78_1.0.1&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.netgear.com/&#34;&gt;https://www.netgear.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability allows for an attacker with LAN access to a NETGEAR R6260 router to execute arbitrary code. This was tested on the latest firmware available for the router, V1.1.0.78_1.0.1 at the point of writing.&lt;/p&gt;&#xA;&lt;p&gt;When setupwizard.cgi is executed via a HTTP SOAP request, specially crafted SOAP-ENV headers will cause &lt;code&gt;strncpy()&lt;/code&gt; to produce unterminated strings in &lt;code&gt;analyse_XML_namespace()&lt;/code&gt;. A subsequent &lt;code&gt;sprintf()&lt;/code&gt; call in the same function will introduce a buffer overflow due to overlapping strings, allowing for instruction pointer control.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-34979) NETGEAR R6260 mini_httpd Buffer Overflow Unauthenticated Remote Code Execution</title>
      <link>https://starlabs.sg/advisories/21/21-34979/</link>
      <pubDate>Mon, 22 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-34979/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-34979&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;NETGEAR R6260 V1.1.0.78_1.0.1&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.netgear.com/&#34;&gt;https://www.netgear.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability allows for an attacker with LAN access to a NETGEAR R6260 router to execute arbitrary code. This was tested on the latest firmware available for the router, V1.1.0.78_1.0.1 at the point of writing.&lt;/p&gt;&#xA;&lt;p&gt;A buffer overflow in mini_httpd.c:1768 allows for unexpectedly long environment variables to be passed to the setupwizard.cgi executable. When setupwizard.cgi is executed via a specially crafted HTTP SOAP request, an unbounded strcat() in the check_soap_login_record() function allows for instruction pointer control when the environment variable SOAP_LOGIN_TOKEN is sufficiently long. An attacker can use this to execute arbitrary code as root.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0950) Android NFC android.hardware.nfc@1.2-service Writer mode Out-Of-Bounds Write leading to Information Disclosure</title>
      <link>https://starlabs.sg/advisories/21/21-0950/</link>
      <pubDate>Fri, 05 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0950/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0950&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;RQ1A.210205.004&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.android.com/&#34;&gt;https://www.android.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;An Out-Of-Bounds Write bug was found in &lt;code&gt;nfc_nci_nxp.so&lt;/code&gt;. Specifically, in file &lt;code&gt;&amp;quot;hardware/nxp/nfc/halimpl/hal/phNxpNciHal_ext.cc&amp;quot;&lt;/code&gt;, function &lt;code&gt;phNxpNciHal_write_ext&lt;/code&gt;, due to lack of proper validation of the length of supplied command prior to increasing length of it, leading to 3 bytes overflow problem. This vulnerability can be turned into a read past the end of a global buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of NFC HIDL service.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-33760) Windows Media Foundation Integer Overflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-33760/</link>
      <pubDate>Sat, 27 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-33760/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-33760&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;mfsrcsnk.dll 10.0.18362.836&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.microsoft.com/&#34;&gt;https://www.microsoft.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;An integer overflow leads to OOB read when parsing &lt;code&gt;MP3&lt;/code&gt; header. The crash can be trigger by navigating into the folder containing the &lt;code&gt;POC&lt;/code&gt; file.&#xA;The crash happens inside &lt;code&gt;mfsrcsnk.dll&lt;/code&gt; when parsing &lt;code&gt;MP3&lt;/code&gt; header. Stack trace.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;(582c.420c): Access violation - code c0000005 (first chance)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;First chance exceptions are reported before any exception handling.&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;This exception may be expected and handled.&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;mfsrcsnk!CMPEGFrame::DeSerializeFrameHeader+0x42:&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;00007ffa`88140492 418b0e          mov     ecx,dword ptr [r14] ds:00000264`bf9f527f=????????&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0:000&amp;gt; k&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; # Child-SP          RetAddr           Call Site&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;00 00000084`61afe770 00007ffa`881408a8 mfsrcsnk!CMPEGFrame::DeSerializeFrameHeader+0x42&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;01 00000084`61afe7f0 00007ffa`8814128c mfsrcsnk!CMP3MediaSourcePlugin::ReadMPEGFrameHeader+0x78&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;02 00000084`61afe860 00007ffa`8813f62c mfsrcsnk!CMP3MediaSourcePlugin::DoReadFrameHeader+0x5c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;03 00000084`61afe8e0 00007ffa`8813fefa mfsrcsnk!CMP3MediaSourcePlugin::ParseHeader+0x1cc&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;04 00000084`61afe9c0 00007ffa`8813fd60 mfsrcsnk!CMFMP3PropertyHandler::FeedNextBufferToPlugin+0x12e&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;05 00000084`61afea60 00007ffa`88137763 mfsrcsnk!CMFMP3PropertyHandler::FeedBuffersToPlugin+0x9c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;06 00000084`61afeb20 00007ffa`881492e4 mfsrcsnk!CMFMP3PropertyHandler::InternalInitialize+0x103&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;07 00000084`61afebf0 00007ffa`f1885451 mfsrcsnk!CMFPropHandlerBase::Initialize+0x84&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;08 00000084`61afec50 00007ffa`f188241b windows_storage!InitializeFileHandlerWithStream+0x175&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;09 00000084`61afed10 00007ffa`f1913fc5 windows_storage!CFileSysItemString::HandlerCreateInstance+0x2c7&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0a 00000084`61afee00 00007ffa`f1878fd6 windows_storage!CFileSysItemString::_PropertyHandlerCreateInstance+0xad&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0b 00000084`61afeeb0 00007ffa`f190a680 windows_storage!CFileSysItemString::LoadHandler+0x1aa&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0c 00000084`61aff000 00007ffa`f1876ab5 windows_storage!CFSFolder::LoadHandler+0xe0&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0d 00000084`61aff360 00007ffa`f18772a2 windows_storage!CFSPropertyStoreFactory::_GetFileStore+0x165&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0e 00000084`61aff430 00007ffa`f1876c12 windows_storage!CFSPropertyStoreFactory::_GetPropertyStore+0x20e&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0f 00000084`61aff520 00007ffa`f189d024 windows_storage!CFSPropertyStoreFactory::GetPropertyStore+0x22&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;10 00000084`61aff560 00007ffa`f189f18b windows_storage!CShellItem::_GetPropertyStoreWorker+0x384&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;11 00000084`61affaa0 00007ffa`f3b36ddb windows_storage!CShellItem::GetPropertyStore+0xdb&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;*** WARNING: Unable to verify checksum for metadata.exe&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;12 00000084`61affd70 00007ff7`0fc710ac SHELL32!SHGetPropertyStoreFromParsingName+0x5b&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;13 00000084`61affde0 00007ff7`0fc7117c metadata+0x10ac&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;14 00000084`61affe70 00007ff7`0fc713a4 metadata+0x117c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;15 00000084`61affea0 00007ffa`f26a7bd4 metadata+0x13a4&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;16 00000084`61affee0 00007ffa`f452ce51 KERNEL32!BaseThreadInitThunk+0x14&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;17 00000084`61afff10 00000000`00000000 ntdll!RtlUserThreadStart+0x21&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0:000&amp;gt; !heap -p -a @r14&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    address 00000264bf9f527f found in&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    _DPH_HEAP_ROOT @ 264bf911000&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    in free-ed allocation (  DPH_HEAP_BLOCK:         VirtAddr         VirtSize)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                                264bf913af8:      264bf9f5000             2000&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf45c51c4 ntdll!RtlDebugFreeHeap+0x000000000000003c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf4575670 ntdll!RtlpFreeHeap+0x0000000000073d90&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf4500790 ntdll!RtlpFreeHeapInternal+0x0000000000000790&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf44ffb91 ntdll!RtlFreeHeap+0x0000000000000051&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf4199cfc msvcrt!free+0x000000000000001c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa88140f2b mfsrcsnk!CID3Frame::`vector deleting destructor&amp;#39;+0x000000000000005b&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa8814d34a mfsrcsnk!CMP3Base::Release+0x000000000000003a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa881346d9 mfsrcsnk!ComSmartPtr&amp;lt;Windows::Foundation::Collections::IMap&amp;lt;HSTRING__ * __ptr64,IInspectable * __ptr64&amp;gt; &amp;gt;::~ComSmartPtr&amp;lt;Windows::Foundation::Collections::IMap&amp;lt;HSTRING__ * __ptr64,IInspectable * __ptr64&amp;gt; &amp;gt;+0x0000000000000019&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa88140db0 mfsrcsnk!CID3Header::ReadFrames+0x0000000000000134&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa881512c1 mfsrcsnk!CID3Header::DeSerializeFrameBody+0x0000000000000071&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa8814b918 mfsrcsnk!CMP3MediaSourcePlugin::DoReadHeaderBody+0x0000000000000060&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa8813f896 mfsrcsnk!CMP3MediaSourcePlugin::ParseHeader+0x0000000000000436&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa8813fefa mfsrcsnk!CMFMP3PropertyHandler::FeedNextBufferToPlugin+0x000000000000012e&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa8813fd60 mfsrcsnk!CMFMP3PropertyHandler::FeedBuffersToPlugin+0x000000000000009c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa88137763 mfsrcsnk!CMFMP3PropertyHandler::InternalInitialize+0x0000000000000103&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffa881492e4 mfsrcsnk!CMFPropHandlerBase::Initialize+0x0000000000000084&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf1885451 windows_storage!InitializeFileHandlerWithStream+0x0000000000000175&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf188241b windows_storage!CFileSysItemString::HandlerCreateInstance+0x00000000000002c7&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf1913fc5 windows_storage!CFileSysItemString::_PropertyHandlerCreateInstance+0x00000000000000ad&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf1878fd6 windows_storage!CFileSysItemString::LoadHandler+0x00000000000001aa&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf190a680 windows_storage!CFSFolder::LoadHandler+0x00000000000000e0&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf1876ab5 windows_storage!CFSPropertyStoreFactory::_GetFileStore+0x0000000000000165&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf18772a2 windows_storage!CFSPropertyStoreFactory::_GetPropertyStore+0x000000000000020e&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf1876c12 windows_storage!CFSPropertyStoreFactory::GetPropertyStore+0x0000000000000022&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf189d024 windows_storage!CShellItem::_GetPropertyStoreWorker+0x0000000000000384&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf189f18b windows_storage!CShellItem::GetPropertyStore+0x00000000000000db&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf3b36ddb SHELL32!SHGetPropertyStoreFromParsingName+0x000000000000005b&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ff70fc710ac metadata+0x00000000000010ac&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ff70fc7117c metadata+0x000000000000117c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ff70fc713a4 metadata+0x00000000000013a4&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf26a7bd4 KERNEL32!BaseThreadInitThunk+0x0000000000000014&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    00007ffaf452ce51 ntdll!RtlUserThreadStart+0x0000000000000021&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;code&gt;@r14&lt;/code&gt; points to an invalid location on the heap.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-34503) Windows Media Foundation Type Confusion Vulnerability</title>
      <link>https://starlabs.sg/advisories/21/21-34503/</link>
      <pubDate>Sat, 27 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-34503/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-34503&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;mfsrcsnk.dll 10.0.18362.836&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.microsoft.com/&#34;&gt;https://www.microsoft.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;There is a type confusion when parsing Quick Time video file format&amp;rsquo;s metadata that leads to OOB access on heap memory. The vulnerability can be triggered by navigating into folder contains &lt;code&gt;POC&lt;/code&gt; file,  inside Internet Explorer and Microsoft Edge.&lt;/p&gt;&#xA;&lt;p&gt;The crashes happens inside &lt;code&gt;mfmp4srcsnk.dll&lt;/code&gt; when parsing &lt;code&gt;CQTSampleDescriptionAtom&lt;/code&gt;. Stack trace.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-gdscript3&#34; data-lang=&#34;gdscript3&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;(&lt;span style=&#34;color:#a5d6ff&#34;&gt;2154.3&lt;/span&gt;bf0): Access violation &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;-&lt;/span&gt; code c0000005 (first chance)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;First chance exceptions are reported before any exception handling&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;This exception may be expected &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;and&lt;/span&gt; handled&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;eax&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;05&lt;/span&gt;d90ee8 ebx&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;05&lt;/span&gt;d7ef00 ecx&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;05&lt;/span&gt;d84f78 edx&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;05&lt;/span&gt;d8efe8 esi&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba00cf0 edi&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;05&lt;/span&gt;d80f00&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;eip&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba43c64 esp&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fedec ebp&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fedf8 iopl&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;         nv up ei pl zr na pe nc&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cs&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0023&lt;/span&gt;  ss&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b  ds&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b  es&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b  fs&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0053&lt;/span&gt;  gs&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b             efl&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;00010246&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CAVCVideoSampleDescription::IsBetterForMediaType&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x44&lt;/span&gt;:&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba43c64 &lt;span style=&#34;color:#a5d6ff&#34;&gt;8&lt;/span&gt;bb704010000    mov     esi,dword ptr [edi&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;104&lt;/span&gt;h] ds:&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b:&lt;span style=&#34;color:#a5d6ff&#34;&gt;05&lt;/span&gt;d81004&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#f85149&#34;&gt;????????&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;:&lt;span style=&#34;color:#a5d6ff&#34;&gt;000&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;gt;&lt;/span&gt; k&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;# ChildEBP RetAddr  &lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;00&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fedf8 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;b9fea8a mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CAVCVideoSampleDescription::IsBetterForMediaType&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x44&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;01&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fee44 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;b9fdc50 mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTSampleDescriptionAtom::FinalParseAtom&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x36a&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;02&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;feedc &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;b9ff7bd mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTSampleTable::FinalParseAtom&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x3d0&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;03&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fef6c &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;b9ff51e mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTAtom::FinalParseAtom&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xdd&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;04&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fef8c &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;b9ff7bd mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTMedia::FinalParseAtom&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x3e&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;05&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fefd4 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;b9fecbc mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTAtom::FinalParseAtom&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xdd&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;06&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff004 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;b9ff7bd mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTTrack::FinalParseAtom&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x9c&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;07&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff04c &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;b9fd1e8 mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTAtom::FinalParseAtom&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xdd&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;08&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff094 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba02ed9 mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTMovie::FinalParseAtom&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x138&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;09&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff0f8 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba1e00c mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTMovie::CreateQTMovie&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x2b9&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;a &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff180 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba1d4bf mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CQTMovie::CreateMovieFromBuffer&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x571&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;b &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff1b0 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba252ff mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;MFCreateQTMovie&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x4a&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;c &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff1e8 &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba30cea mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CMFMP4PropertyHandler::LoadMetadataProvider&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x13e&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;d &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff25c &lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ba351cf mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CMFMP4PropertyHandler::InternalInitialize&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xba&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;e &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff280 &lt;span style=&#34;color:#a5d6ff&#34;&gt;753&lt;/span&gt;fab92 mfmp4srcsnk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CMFPropHandlerBase::Initialize&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x1af&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;f &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff2d4 &lt;span style=&#34;color:#a5d6ff&#34;&gt;75480&lt;/span&gt;a38 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;InitializeFileHandlerWithStream&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x184&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;10&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff364 &lt;span style=&#34;color:#a5d6ff&#34;&gt;754&lt;/span&gt;ef088 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFileSysItemString::HandlerCreateInstance&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x1ba&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;11&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff3b4 &lt;span style=&#34;color:#a5d6ff&#34;&gt;753&lt;/span&gt;fd557 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFileSysItemString::_PropertyHandlerCreateInstance&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x69&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;12&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff488 &lt;span style=&#34;color:#a5d6ff&#34;&gt;753&lt;/span&gt;fb4b6 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFileSysItemString::LoadHandler&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x181&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;13&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff748 &lt;span style=&#34;color:#a5d6ff&#34;&gt;753&lt;/span&gt;fb0cc windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFSFolder::LoadHandler&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xa6&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;14&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff7a0 &lt;span style=&#34;color:#a5d6ff&#34;&gt;753&lt;/span&gt;f9849 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFSPropertyStoreFactory::_GetFileStore&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x148&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;15&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff7b8 &lt;span style=&#34;color:#a5d6ff&#34;&gt;7545&lt;/span&gt;a37e windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFSPropertyStoreFactory::_s_GetFileStore&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x19&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;16&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff828 &lt;span style=&#34;color:#a5d6ff&#34;&gt;7545&lt;/span&gt;a094 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFSPropertyStoreFactory::_GetMultiplexPropertyStore&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x217&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;17&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff86c &lt;span style=&#34;color:#a5d6ff&#34;&gt;7545&lt;/span&gt;aa5e windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFSPropertyStoreFactory::_GetPropertyStore&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xa9&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;18&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ff888 &lt;span style=&#34;color:#a5d6ff&#34;&gt;7544&lt;/span&gt;c632 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CFSPropertyStoreFactory::GetPropertyStore&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x1e&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;19&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ffb7c &lt;span style=&#34;color:#a5d6ff&#34;&gt;7544&lt;/span&gt;d5d6 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CShellItem::_GetPropertyStoreWorker&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xb22&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;a &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ffde4 &lt;span style=&#34;color:#a5d6ff&#34;&gt;76887&lt;/span&gt;ca6 windows_storage&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;CShellItem::GetPropertyStore&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xb6&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;***&lt;/span&gt; WARNING: Unable to verify checksum &lt;span style=&#34;color:#ff7b72&#34;&gt;for&lt;/span&gt; metadata&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;exe&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;b &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ffe14 &lt;span style=&#34;color:#a5d6ff&#34;&gt;00021085&lt;/span&gt; SHELL32&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;SHGetPropertyStoreFromParsingName&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x56&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;c &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ffe74 &lt;span style=&#34;color:#a5d6ff&#34;&gt;00021190&lt;/span&gt; metadata&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;target_func&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x35&lt;/span&gt; [c:\users\bit\source\repos\mf\metadata\metadata&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;cpp &lt;span style=&#34;color:#f85149&#34;&gt;@&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;15&lt;/span&gt;] &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;d &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ffe8c &lt;span style=&#34;color:#a5d6ff&#34;&gt;0002137&lt;/span&gt;a metadata&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;wmain&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x40&lt;/span&gt; [c:\users\bit\source\repos\mf\metadata\metadata&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;cpp &lt;span style=&#34;color:#f85149&#34;&gt;@&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;55&lt;/span&gt;] &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;e (Inline) &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;--------&lt;/span&gt; metadata&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;invoke_main&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x1c&lt;/span&gt; [d:\agent\_work\&lt;span style=&#34;color:#a5d6ff&#34;&gt;3&lt;/span&gt;\s\src\vctools\crt\vcstartup\src\startup\exe_common&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;inl &lt;span style=&#34;color:#f85149&#34;&gt;@&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;90&lt;/span&gt;] &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;f &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ffed4 &lt;span style=&#34;color:#a5d6ff&#34;&gt;77266359&lt;/span&gt; metadata&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;__scrt_common_main_seh&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0xfa&lt;/span&gt; [d:\agent\_work\&lt;span style=&#34;color:#a5d6ff&#34;&gt;3&lt;/span&gt;\s\src\vctools\crt\vcstartup\src\startup\exe_common&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;inl &lt;span style=&#34;color:#f85149&#34;&gt;@&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;288&lt;/span&gt;] &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;20&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;ffee4 &lt;span style=&#34;color:#a5d6ff&#34;&gt;77&lt;/span&gt;a97c24 KERNEL32&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;BaseThreadInitThunk&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x19&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;21&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fff40 &lt;span style=&#34;color:#a5d6ff&#34;&gt;77&lt;/span&gt;a97bf4 ntdll&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;__RtlUserThreadStart&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x2f&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;22&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;006&lt;/span&gt;fff50 &lt;span style=&#34;color:#a5d6ff&#34;&gt;00000000&lt;/span&gt; ntdll&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;_RtlUserThreadStart&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x1b&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;code&gt;@edi&lt;/code&gt; points to an object of size only &lt;code&gt;0x100&lt;/code&gt; but the code tries to access a property at offset &lt;code&gt;0x104&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-1758) macOS/iOS CoreText Out-Of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-1758/</link>
      <pubDate>Wed, 10 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-1758/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-1758&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;macOS Catalina 10.15.4 (19E287)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://apple.com&#34;&gt;https://apple.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability exists in &lt;strong&gt;&lt;code&gt;libFontParser.dylib&lt;/code&gt;&lt;/strong&gt;, a part of &lt;strong&gt;&lt;code&gt;CoreText&lt;/code&gt;&lt;/strong&gt; library is widely used in macOS, iOS, iPadOS to parse, and draw text. This vulnerability allows attacker to read memory of application which uses API from &lt;strong&gt;&lt;code&gt;CoreText&lt;/code&gt;&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;macOS/iOS creates a font format structure that is a wrapper of Type 1 Postscript Font and TrueType Font is Mac Resource Fork Font. &lt;strong&gt;&lt;code&gt;CoreText&lt;/code&gt;&lt;/strong&gt; is a framework to draw text that supports load Mac Resource Fork Font through API &lt;strong&gt;&lt;code&gt;CoreText&lt;/code&gt;&lt;/strong&gt; &lt;strong&gt;&lt;code&gt;CTFontManagerCreateFontDescriptorsFromURL&lt;/code&gt;&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-1790) macOS/iOS CoreText libhvf Out-Of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/21/21-1790/</link>
      <pubDate>Wed, 10 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-1790/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-1790&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;macOS Catalina 10.15.4 (19E287)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://apple.com&#34;&gt;https://apple.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability exists in &lt;strong&gt;&lt;code&gt;libhvf.dylib&lt;/code&gt;&lt;/strong&gt;, a part of &lt;strong&gt;&lt;code&gt;CoreText&lt;/code&gt;&lt;/strong&gt; library is widely used in macOS, iOS, iPadOS to parse font. An attacker can craft an evil PDF contains the malicious font that could lead to remote code execution.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;&lt;code&gt;libhvf.dylib&lt;/code&gt;&lt;/strong&gt; is used to parse &lt;strong&gt;&lt;code&gt;HierVariation&lt;/code&gt;&lt;/strong&gt; table in Truetype Font. &lt;strong&gt;&lt;code&gt;libhvf.dylib&lt;/code&gt;&lt;/strong&gt; is a feature of &lt;strong&gt;&lt;code&gt;libFontParser.dylib&lt;/code&gt;&lt;/strong&gt;. To enable this feature user must create a plist file in &lt;code&gt;/User/&amp;lt;user&amp;gt;/Library/Preferences/com.apple.FontParser.plist&lt;/code&gt; with following content.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Chrome 1-Day Hunting - Uncovering and Exploiting CVE-2020-15999</title>
      <link>https://starlabs.sg/blog/2021/01-chrome-1-day-hunting-uncovering-and-exploiting-cve-2020-15999/</link>
      <pubDate>Sat, 09 Jan 2021 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2021/01-chrome-1-day-hunting-uncovering-and-exploiting-cve-2020-15999/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h1&gt;&#xA;&lt;p&gt;This blog post details the exploitation process for the vulnerability CVE 2020-15999 in Google Chrome 86.0.4222.0 on Linux. While CVE 2020-15999 is a heap-based buffer overflow in the font-loading library Freetype rather than Chrome proper, its extensive use in the latter enables us to achieve code execution in the browser’s renderer. This post will not be focused on the analysis of the bug, but rather its exploitation, as extensive explanation and analysis can be found &lt;a href=&#34;https://savannah.nongnu.org/bugs/?59308&#34;&gt;here&lt;/a&gt;. In essence, Truetype font files that contain bitmaps (i.e. raster images) store them in the &lt;a href=&#34;https://docs.microsoft.com/en-us/typography/opentype/spec/sbix&#34;&gt;sbix&lt;/a&gt; table of the font. When Freetype loads an embedded PNG image in the sbix table with dimensions exceeding the int16 limit, an integer overflow to buffer overflow (&lt;a href=&#34;https://cwe.mitre.org/data/definitions/680.html&#34;&gt;IO2BO&lt;/a&gt;) occurs. A PoC to achieve code execution in the renderer and pop calculator can be found in the last section of this post.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Instrumenting Adobe Reader with Frida</title>
      <link>https://starlabs.sg/blog/2020/11-instrumenting-adobe-reader-with-frida/</link>
      <pubDate>Fri, 13 Nov 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2020/11-instrumenting-adobe-reader-with-frida/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://frida.re/&#34;&gt;Frida&lt;/a&gt; is an open-source dynamic instrumentation toolkit that has become popular in recent years, and its use in mobile security is especially prevalent.&lt;/p&gt;&#xA;&lt;p&gt;In this post, I would like to provide a general introduction to the tool and show some examples of how it can also be used on the Windows platform.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Tokyo 2020</title>
      <link>https://starlabs.sg/achievements/pwn2own-tokyo-2020/</link>
      <pubDate>Sun, 08 Nov 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-tokyo-2020/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2020/7/28/announcing-pwn2own-tokyo-2020-live-from-toronto&#34;&gt;2020 fall edition of Pwn2Own (Pwn2Own Tokyo)&lt;/a&gt; was held from 06th to 08th November 2020 in a virtual format due to the ongoing COVID-19 pandemic that has limited many contestants&amp;rsquo; traveling operations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Analysis &amp; Exploitation of a Recent TP-Link Archer A7 Vulnerability</title>
      <link>https://starlabs.sg/blog/2020/10-analysis-exploitation-of-a-recent-tp-link-archer-a7-vulnerability/</link>
      <pubDate>Fri, 16 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2020/10-analysis-exploitation-of-a-recent-tp-link-archer-a7-vulnerability/</guid>
      <description>&lt;p&gt;This post provides detailed analysis and an exploit achieving remote code execution for &lt;strong&gt;CVE-2020-10882&lt;/strong&gt;, which was used at Pwn2Own 2019, on the TP-Link Archer C7:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability.&lt;/p&gt;&#xA;&lt;p&gt;The specific flaw exists within the tdpServer service, which listens on UDP port 20002 by default. When parsing the slave_mac parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the root user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own 2020: Oracle VirtualBox Escape</title>
      <link>https://starlabs.sg/blog/2020/09-pwn2own-2020-oracle-virtualbox-escape/</link>
      <pubDate>Fri, 25 Sep 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2020/09-pwn2own-2020-oracle-virtualbox-escape/</guid>
      <description>&lt;p&gt;In this post, we will cover the vulnerabilities used at Pwn2Own 2020 for the Oracle VirtualBox escape.&#xA;These two vulnerabilities affect Oracle VirtualBox 6.1.4 and prior versions.&lt;/p&gt;</description>
    </item>
    <item>
      <title>This Font is not Your Type</title>
      <link>https://starlabs.sg/blog/2020/09-this-font-is-not-your-type/</link>
      <pubDate>Fri, 04 Sep 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2020/09-this-font-is-not-your-type/</guid>
      <description>&lt;p&gt;Half a year ago, I found a vulnerability in &lt;code&gt;libFontParser.dylib&lt;/code&gt;, which&#xA;is a part of CoreGraphics library that is widely used in macOS, iOS,&#xA;iPadOS to parse and render fonts. This vulnerability was patched in iOS 13.5.1 &amp;amp; macOS 10.15.5. In this writeup, I will describe the bug in detail in&#xA;hopes that it will help others to better understand this vulnerability.&#xA;This issue could allow an attacker to execute code during the parsing of&#xA;a malicious font.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-24430) Adobe Acrobat Pro DC FDF.addContact Use-After-Free Vulnerability</title>
      <link>https://starlabs.sg/advisories/20/20-24430/</link>
      <pubDate>Fri, 21 Aug 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-24430/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-24430&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2020.012.20041&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://adobe.com&#34;&gt;https://adobe.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&lt;/p&gt;&#xA;&lt;p&gt;There is an UAF bug when Adobe Acrobat DC executes javascript related to the &lt;code&gt;FDF.addContact&lt;/code&gt; function&lt;/p&gt;&#xA;&lt;p&gt;The following is the crash context (with page heap enabled):&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-gdscript3&#34; data-lang=&#34;gdscript3&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;First chance exceptions are reported before any exception handling&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;This exception may be expected &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;and&lt;/span&gt; handled&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;eax&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;00000000&lt;/span&gt; ebx&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;004&lt;/span&gt;fb7bc ecx&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;ceeafd0 edx&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0030&lt;/span&gt;d000 esi&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;ceeafd0 edi&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;7e476&lt;/span&gt;eb8&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;eip&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;6301132&lt;/span&gt;a esp&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;004&lt;/span&gt;fb5ec ebp&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;004&lt;/span&gt;fb608 iopl&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;         nv up ei pl zr na pe nc&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cs&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0023&lt;/span&gt;  ss&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b  ds&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b  es&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b  fs&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0053&lt;/span&gt;  gs&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b             efl&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;00210246&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Acrobat&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;!&lt;/span&gt;DllCanUnloadNow&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0x6153a&lt;/span&gt;:&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;6301132&lt;/span&gt;a &lt;span style=&#34;color:#a5d6ff&#34;&gt;8&lt;/span&gt;b5f14          mov     ebx,dword ptr [edi&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;+&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;14&lt;/span&gt;h] ds:&lt;span style=&#34;color:#a5d6ff&#34;&gt;002&lt;/span&gt;b:&lt;span style=&#34;color:#a5d6ff&#34;&gt;7e476&lt;/span&gt;ecc&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#f85149&#34;&gt;????????&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;vulnerability-discoveryanalysis&#34;&gt;Vulnerability Discovery/Analysis&lt;/h2&gt;&#xA;&lt;p&gt;The following POC would trigger the bug when executed in a &lt;strong&gt;privileged / trusted context&lt;/strong&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>ASUSWRT URL Processing Stack Buffer Overflow</title>
      <link>https://starlabs.sg/blog/2020/08-asuswrt-url-processing-stack-buffer-overflow/</link>
      <pubDate>Fri, 07 Aug 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2020/08-asuswrt-url-processing-stack-buffer-overflow/</guid>
      <description>&lt;p&gt;While processing the URL for any blacklisted XSS list like the script tag in the &lt;code&gt;check_xss_blacklist&lt;/code&gt; function, a stack buffer overflow is possible by extending the length of the URL when accessing the web interface of the ASUS Router. To exploit it, stack pivoting technique is used before chaining up ROP gadgets to call our own custom command. In this post, we show how this can be exploited to get a reverse shell.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-13937) Apache Kylin - Unauthenticated Configuration Disclosure</title>
      <link>https://starlabs.sg/advisories/20/20-13937/</link>
      <pubDate>Fri, 17 Jul 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-13937/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-13937&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;All versions starting from 2.0.0 up to 2.3.2, all versions starting from 2.4.0 up to 2.4.1, all versions starting from 2.5.0 up to 2.5.2, all versions starting from 2.6.0 up to 2.6.6, all versions starting from 3.0.0 up to 3.0.2, version 3.1.0&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;http://kylin.apache.org/&#34;&gt;http://kylin.apache.org/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;There is an unauthenticated configuration disclosure via &lt;code&gt;/kylin/api/admin/config&lt;/code&gt; GET API Endpoint.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;code&gt;getConfig()&lt;/code&gt; method of &lt;code&gt;AdminController.java&lt;/code&gt; handling &lt;code&gt;/kylin/api/admin/config&lt;/code&gt; endpoint did not include any security checks, which allowed an unauthenticated user to disclose all Kylin configuration settngs, which includes sensitive information such as LDAP and JDBC credentials.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Oracle VirtualBox VHWA Use-After-Free Privilege Escalation Vulnerability</title>
      <link>https://starlabs.sg/blog/2020/06-oracle-virtualbox-vhwa-use-after-free-privilege-escalation-vulnerability/</link>
      <pubDate>Fri, 26 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2020/06-oracle-virtualbox-vhwa-use-after-free-privilege-escalation-vulnerability/</guid>
      <description>&lt;p&gt;As part of my month-long internship at STAR Labs, I was introduced to VirtualBox and learnt much about bug hunting and triaging, root-cause analysis and exploitation. This post will detail a use-after-free bug I found during the duration of the internship, and specifics on the VM escape exploit that I wrote utilising the bug. The latest version at the point of reporting was VirtualBox 6.1.2 r135662.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-0634) Windows CLFS UAF Memory Corruption Vulnerability</title>
      <link>https://starlabs.sg/advisories/20/20-0634/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-0634/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-0634&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Windows RS2( 2019.01.08) build 7763&lt;/li&gt;&#xA;&lt;li&gt;ntoskrnl.exe  file version 10.0.17763.195 . MD5:4a8bc8a4b90486a5567fb6c6bf93ab6b&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.microsoft.com/&#34;&gt;https://www.microsoft.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;An elevation of privilege vulnerability exists when the &lt;a href=&#34;https://technet.microsoft.com/library/security/dn848375.aspx#CLFS&#34;&gt;Windows Common Log File System (CLFS)&lt;/a&gt; driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.&lt;/p&gt;&#xA;&lt;p&gt;To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-1664) Juniper Junos OS dcd create_debug_data() buffer overflow</title>
      <link>https://starlabs.sg/advisories/20/20-1664/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-1664/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-1664&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Junos OS 20.1R1.11&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.juniper.net/&#34;&gt;https://www.juniper.net/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;&lt;code&gt;dcd&lt;/code&gt;&lt;/strong&gt; is device control daemon and is running as root by default when the device starts.  This daemon has a stack buffer overflow vulnerability that allows an attacker with low privilege to DOS the daemon or execute arbitrary code in the system with root privilege.&lt;/p&gt;&#xA;&lt;p&gt;The vulnerability exists in &lt;code&gt;create_debug_data()&lt;/code&gt; function:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-c&#34; data-lang=&#34;c&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;FILE &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;*&lt;/span&gt;&lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;create_debug_data&lt;/span&gt;()&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;{&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;  &lt;span style=&#34;color:#ff7b72&#34;&gt;char&lt;/span&gt; v13; &lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;// [esp+3h] [ebp-51h]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&lt;/span&gt;  result &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;fopen&lt;/span&gt;(&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;/var/tmp/dcd_debug.txt&amp;#34;&lt;/span&gt;, &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;r&amp;#34;&lt;/span&gt;);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;  v1 &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; result;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;  ifd_list_head &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;  &lt;span style=&#34;color:#ff7b72&#34;&gt;if&lt;/span&gt; ( result )&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;  {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    dcd_global_dump_flag &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#ff7b72&#34;&gt;if&lt;/span&gt; ( &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;fscanf&lt;/span&gt;(result, &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;%s&amp;#34;&lt;/span&gt;, &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&lt;/span&gt;v13) &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;==&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt; )&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      v15 &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      stream &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;=&lt;/span&gt; v1;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#ff7b72&#34;&gt;do&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      {&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#d2a8ff;font-weight:bold&#34;&gt;dcd_print_i&lt;/span&gt;(&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;          &lt;span style=&#34;color:#a5d6ff&#34;&gt;8&lt;/span&gt;,&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;          &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;%u %s:%d %s() %s : Adding Interface %s to debug list&amp;#34;&lt;/span&gt;,&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;          gDcdPid,&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;          &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;dcd.c&amp;#34;&lt;/span&gt;,&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;          &lt;span style=&#34;color:#a5d6ff&#34;&gt;4770&lt;/span&gt;,&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;          &lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;create_debug_data&amp;#34;&lt;/span&gt;,&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;          szSev[&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;],&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;          &lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;amp;&lt;/span&gt;v13);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;...&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The buffer overflow vulnerability is caused by reading content in &lt;code&gt;/var/tmp/dcd_debug.txt&lt;/code&gt; to a stack-based buffer. With the low privilege user, an attacker could put the long string to &lt;code&gt;/var/tmp/dcd_debug.txt&lt;/code&gt; file to trigger the vulnerability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0218) Junos OS lc_fetch_license_keys() command injection</title>
      <link>https://starlabs.sg/advisories/21/21-0218/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0218/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0218&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Junos OS 20.1R1.11&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.juniper.net/&#34;&gt;https://www.juniper.net/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;&lt;code&gt;license-check&lt;/code&gt;&lt;/strong&gt; is a daemon to manage license in Juniper device. By default, this daemon is running as root. There is a command injection vulnerability in &lt;strong&gt;&lt;code&gt;license-check&lt;/code&gt;&lt;/strong&gt; daemon that allows an attacker with low privilege to execute a command with root privilege.&lt;/p&gt;&#xA;&lt;p&gt;The command injection exists in the license update feature. To update license, user run command &lt;code&gt;request system license update&lt;/code&gt; in cli console. First, when run this command, the &lt;code&gt;mgd_update_license()&lt;/code&gt; function in &lt;code&gt;/usr/lib/dd/libjunos-actions-impl.so&lt;/code&gt; is called.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-0219) Juniper Junos OS validate package mgd_package_real() command injection</title>
      <link>https://starlabs.sg/advisories/21/21-0219/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-0219/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-0219&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Junos OS 20.1R1.11&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.juniper.net/&#34;&gt;https://www.juniper.net/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;The command injection vulnerability exists in the validation of the installed package. Upon successfully exploiting this vulnerability, an attacker with low privilege can execute a command with root privilege in the system.&lt;/p&gt;&#xA;&lt;p&gt;To validate a package on host before installing, user run command &lt;code&gt;request system software add validate-on-host &amp;lt;host&amp;gt; &amp;lt;package-path&amp;gt;&lt;/code&gt; in cli console. First, when run this command, function &lt;code&gt;mgd_package_real()&lt;/code&gt; in &lt;code&gt;/usr/lib/dd/libjunos-actions-impl.so&lt;/code&gt; will be called:&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2021-1485) Cisco IOS XR CLI Arbitrary Command Injection</title>
      <link>https://starlabs.sg/advisories/21/21-1485/</link>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/21/21-1485/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2021-1485&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Cisco IOS XRv 64 bit 7.0.2&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://cisco.com&#34;&gt;https://cisco.com&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;The router CLI implements some commands as passthrough to the underlying Linux shell.&#xA;From some tests conducted, it is evident that there are some quoting issues when passing arguments to the shell.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;RP/0/RSP0/CPU0# dir &amp;#34;&amp;#39;&amp;#34;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;sh: -c: line 0: unexpected EOF while looking for matching `&amp;#39;&amp;#39;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;sh: -c: line 1: syntax error: unexpected end of file&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;sh: -c: line 0: unexpected EOF while looking for matching `&amp;#39;&amp;#39;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;sh: -c: line 1: syntax error: unexpected end of file&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;dir : &amp;#39; : Path does not exist&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;This type of issue could lead to arbitrary command injection from the restricted CLI that does not have direct access to the shell.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-15357) Askey AP5100W Authenticated Command Injection in web Interface</title>
      <link>https://starlabs.sg/advisories/20/20-15357/</link>
      <pubDate>Fri, 22 May 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-15357/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-15357&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Askey AP5100W version Dual_SIG_1.01.071&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.askey.com.tw/&#34;&gt;https://www.askey.com.tw/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Askey AP5100W was a wifi mesh node provided to Singtel customers as part of their Fibre Broadband contract package. It is used to provide greater WiFi coverage in homes or offices.&lt;/p&gt;&#xA;&lt;p&gt;The wifi mesh node comes with a configurable web interface that allows users to modify settings on their mesh nodes and run diagnostics.&lt;/p&gt;&#xA;&lt;p&gt;The default login credential of the web interface for the Askey AP5100W is as follows:&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-25545) Askey AP5100W Information Leak through Insecure backups</title>
      <link>https://starlabs.sg/advisories/20/20-25545/</link>
      <pubDate>Fri, 22 May 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-25545/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-25545&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Askey AP5100W version Dual_SIG_1.01.071&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.askey.com.tw/&#34;&gt;https://www.askey.com.tw/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Askey AP5100W was a wifi mesh node provided to Singtel customers as part of their Fibre Broadband contract package. It is used to provide greater WiFi coverage in homes or offices.&lt;/p&gt;&#xA;&lt;p&gt;The wifi mesh node comes with a configurable web interface that allows users to modify settings on their mesh nodes and run diagnostics.&lt;/p&gt;&#xA;&lt;p&gt;The default login credential of the web interface for the Askey AP5100W is as follows:&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-25546) Askey AP5100W Logic Error allowing Web Admin authentication bypass</title>
      <link>https://starlabs.sg/advisories/20/20-25546/</link>
      <pubDate>Fri, 22 May 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-25546/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-25546&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Askey AP5100W version Dual_SIG_1.01.071&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.askey.com.tw/&#34;&gt;https://www.askey.com.tw/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Askey AP5100W was a wifi mesh node provided to Singtel customers as part of their Fibre Broadband contract package. It is used to provide greater WiFi coverage in homes or offices.&lt;/p&gt;&#xA;&lt;p&gt;The wifi mesh node comes with a configurable web interface that allows users to modify settings on their mesh nodes and run diagnostics.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;The default login credential of the web interface for the Askey AP5100W is as follows:&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-2575) Oracle VirtualBox OHCI Uninitialized Heap Variable - Pwn2Own</title>
      <link>https://starlabs.sg/advisories/20/20-2575/</link>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-2575/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-2575&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.1.0 revision r135406&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-2748) Oracle VirtualBox SVGA Out-of-Bounds Read in vmsvgaR3FifoUpdateCursor</title>
      <link>https://starlabs.sg/advisories/20/20-2748/</link>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-2748/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-2748&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.1.0 r135406&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-2758) Oracle VirtualBox VHWA Use-After-Free Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/20/20-2758/</link>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-2758/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-2758&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.1.2 r135662&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-2894) Oracle VirtualBox e1kInsertChecksum Out-of-Bounds Read - Pwn2Own</title>
      <link>https://starlabs.sg/advisories/20/20-2894/</link>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-2894/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-2894&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.1.0 revision r135406&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-10907) Foxit Reader XFA Widget Use-After-Free Code Execution</title>
      <link>https://starlabs.sg/advisories/20/20-10907/</link>
      <pubDate>Thu, 16 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-10907/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-10907&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Foxit Reader 9.7.0.29455&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.foxitsoftware.com/pdf-reader/&#34;&gt;https://www.foxitsoftware.com/pdf-reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;Foxit Reader&lt;/strong&gt; is a popular PDF reading and printing software.&lt;/p&gt;&#xA;&lt;p&gt;When processing XFA forms within a PDF, a flaw exists when handling widgets in the form, which can lead to code execution.&lt;/p&gt;&#xA;&lt;p&gt;The attacker setup a XFA form which has 2 &lt;code&gt;XFA_Widget&lt;/code&gt;s: combobox, and checkbox_group.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-xml&#34; data-lang=&#34;xml&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&amp;lt;!-- XFA Combo Box --&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;subform&lt;/span&gt; layout=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;tb&amp;#34;&lt;/span&gt; name=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;subform_combox_0&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;occur&lt;/span&gt; initial=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;1&amp;#34;&lt;/span&gt; max=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;10&amp;#34;&lt;/span&gt; min=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;0&amp;#34;&lt;/span&gt; name=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;occur_subform_combox_0&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/occur&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;field&lt;/span&gt; h=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;10mm&amp;#34;&lt;/span&gt; name=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;combox&amp;#34;&lt;/span&gt; w=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;40mm&amp;#34;&lt;/span&gt; x=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;10mm&amp;#34;&lt;/span&gt; y=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;10mm&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;ui&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;choiceList&lt;/span&gt; open=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;onEntry&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;border&amp;gt;&amp;lt;edge/&amp;gt;&amp;lt;/border&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/choiceList&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/ui&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;items&lt;/span&gt; save=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;1&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;text&amp;gt;&lt;/span&gt;apples&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/text&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;text&amp;gt;&lt;/span&gt;bananas&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/text&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;text&amp;gt;&lt;/span&gt;pears&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/text&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/items&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;text&amp;gt;&lt;/span&gt;apples&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/text&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;event&lt;/span&gt; activity=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;ready&amp;#34;&lt;/span&gt; ref=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;$layout&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;script&lt;/span&gt; contentType=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;application/x-javascript&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;xfa.host.openList(&amp;#34;my_doc.subform_combox_0&amp;#34;);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/script&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/event&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/field&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/subform&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&amp;lt;!-- XFA CheckBox Group--&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;subform&lt;/span&gt; layout=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;tb&amp;#34;&lt;/span&gt; name=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;subform_checkbutton_group_0&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;occur&lt;/span&gt; initial=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;1&amp;#34;&lt;/span&gt; max=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;10&amp;#34;&lt;/span&gt; min=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;0&amp;#34;&lt;/span&gt; name=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;occur_subform_checkbutton_group_0&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/occur&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;exclGroup&lt;/span&gt; layout=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;tb&amp;#34;&lt;/span&gt; name=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;checkbutton_group&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&amp;lt;!-- XFA CheckBox 1--&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;field&lt;/span&gt; h=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;10mm&amp;#34;&lt;/span&gt; name=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;checkbutton_check1&amp;#34;&lt;/span&gt; w=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;40mm&amp;#34;&lt;/span&gt; x=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;30mm&amp;#34;&lt;/span&gt; y=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;600mm&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;ui&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;checkButton&lt;/span&gt; shape=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;round&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;border&amp;gt;&amp;lt;edge/&amp;gt;&amp;lt;/border&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/checkButton&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/ui&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;items&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;integer&amp;gt;&lt;/span&gt;1&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/integer&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/items&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;text&amp;gt;&lt;/span&gt;Select 1&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/text&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;caption&lt;/span&gt; placement=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;left&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;text&amp;gt;&lt;/span&gt;Option 1&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/text&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/caption&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;validate&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;script&lt;/span&gt; contentType=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;application/x-javascript&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&#x9;xfa.resolveNode(&amp;#34;my_doc.subform_checkbutton_group_0.checkbutton_group.checkbutton_check1&amp;#34;).addItem(&amp;#34;this is random string&amp;#34;);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&#x9;xfa.resolveNode(&amp;#34;my_doc.subform_checkbutton_group_0.checkbutton_group&amp;#34;).rawValue = &amp;#34;this is random string&amp;#34;;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/script&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/validate&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/field&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#8b949e;font-style:italic&#34;&gt;&amp;lt;!-- XFA CheckBox 2--&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;field&lt;/span&gt; h=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;10mm&amp;#34;&lt;/span&gt; name=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;checkbutton_check2&amp;#34;&lt;/span&gt; w=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;40mm&amp;#34;&lt;/span&gt; x=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;30mm&amp;#34;&lt;/span&gt; y=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;600mm&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;ui&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;checkButton&lt;/span&gt; shape=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;round&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;border&amp;gt;&amp;lt;edge/&amp;gt;&amp;lt;/border&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/checkButton&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/ui&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;items&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;integer&amp;gt;&lt;/span&gt;2&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/integer&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/items&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;text&amp;gt;&lt;/span&gt;Select 2&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/text&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;caption&lt;/span&gt; placement=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;left&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;text&amp;gt;&lt;/span&gt;Option 2&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/text&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/value&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/caption&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/field&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/exclGroup&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;event&lt;/span&gt; activity=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;ready&amp;#34;&lt;/span&gt; ref=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;$layout&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;script&lt;/span&gt; contentType=&lt;span style=&#34;color:#a5d6ff&#34;&gt;&amp;#34;application/x-javascript&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&#x9;_subform_checkbutton_group_0.addInstance(93);&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/script&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#x9;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/event&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#7ee787&#34;&gt;&amp;lt;/subform&amp;gt;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Foxit Reader didn&amp;rsquo;t properly handle re-entry validate event when adding new instances into PDF XFA form, which leads to Use-After-Free in this case.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TianFu Cup 2019: Adobe Reader Exploitation</title>
      <link>https://starlabs.sg/blog/2020/04-tianfu-cup-2019-adobe-reader-exploitation/</link>
      <pubDate>Fri, 10 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2020/04-tianfu-cup-2019-adobe-reader-exploitation/</guid>
      <description>&lt;p&gt;Last year, I participated in the &lt;a href=&#34;http://www.tianfucup.com/&#34;&gt;TianFu Cup&lt;/a&gt; competition in Chengdu, China. The chosen target was the Adobe Reader. This post will detail a use-after-free bug of JSObject. My exploit is not clean and not an optimal solution. I have finished this exploit through lots of trial and error.  It involves lots of heap shaping code which I no longer remember exactly why they are there. I would highly suggest that you read the full exploit code and do the debugging yourself if necessary. This blog post was written based on a Windows 10 host with Adobe Reader.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Adventures in Hypervisor: Oracle VirtualBox Research</title>
      <link>https://starlabs.sg/blog/2020/04-adventures-in-hypervisor-oracle-virtualbox-research/</link>
      <pubDate>Fri, 03 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/blog/2020/04-adventures-in-hypervisor-oracle-virtualbox-research/</guid>
      <description>&lt;p&gt;I have been into the vulnerability research field for a while now, and VirtualBox is my very first target. I have learned a lot along the way and I hope that anyone who are interested in escaping hypervisors can find something useful from these notes.&#xA;I assume that you have some basic knowledge on memory corruption, hypervisor architecture and device I/O.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Vancouver 2020</title>
      <link>https://starlabs.sg/achievements/pwn2own-vancouver-2020/</link>
      <pubDate>Sun, 22 Mar 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-vancouver-2020/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2020/1/8/pwn2own-returns-to-vancouver-for-2020&#34;&gt;2020 spring edition of Pwn2Own (Pwn2Own Vancouver)&lt;/a&gt; was held from 19th March to 20th March 2020 in a virtual format due to the ongoing COVID-19 pandemic that has limited many contestants&amp;rsquo; traveling operations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-3800) Adobe Reader xfa.loadXML Use-after-Free</title>
      <link>https://starlabs.sg/advisories/20/20-3800/</link>
      <pubDate>Tue, 17 Mar 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-3800/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-3800&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Acrobat DC version 2019.008.20064 (Windows 10 64-bit)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&lt;/p&gt;&#xA;&lt;p&gt;Both Adobe Reader and Acrobat DC share the same &lt;code&gt;AcroForm.api&lt;/code&gt; plugin:&#xA;File Version 19.012.20040.17853&lt;/p&gt;&#xA;&lt;p&gt;Adobe Reader and Adobe Acrobat DC crashes after executing the following Javascript code:&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-3801) Adobe Reader XFA Heap Address Leak</title>
      <link>https://starlabs.sg/advisories/20/20-3801/</link>
      <pubDate>Tue, 17 Mar 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-3801/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-3801&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Acrobat DC version 2019.008.20064 (Windows 10 64-bit)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&lt;/p&gt;&#xA;&lt;p&gt;Both Adobe Reader and Acrobat DC share the same &lt;code&gt;AcroForm.api&lt;/code&gt; plugin:&#xA;File Version 19.012.20040.17853&lt;/p&gt;&#xA;&lt;p&gt;Adobe Reader (and Adobe Acrobat DC) has a weird &amp;ldquo;feature&amp;rdquo; that leaks heap pointer after executes Javascript when openning XFA PDF.&#xA;Any of these Javascript below would work.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-9816) macOS libFontParser HeapOverflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/20/20-9816/</link>
      <pubDate>Tue, 17 Mar 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-9816/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-9816&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;macOS Catalina 10.15.1 (19B88)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://apple.com&#34;&gt;https://apple.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;This vulnerability exists in libFontParser.dylib, which is a part of CoreGraphic library is widely used in macOS, iOS, iPadOS to parse Font. Attacker can craft an evil PDF contains malicious font could leads to remote code execution in Apple devices.&lt;/p&gt;&#xA;&lt;p&gt;The bug exists in TParsingContext::Subroutine method, which parse Subrs field in Type1 Font.&#xA;TParsingContext::Subroutine try to calculate decrypted buffer size from IV and encrypted buffer size but fail to make sure that decrypted buffer size and encrypted buffer size.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-2682) Oracle VirtualBox VBoxVHWAHandleTable Out-Of-Bounds Access Privilege Escalation</title>
      <link>https://starlabs.sg/advisories/20/20-2682/</link>
      <pubDate>Wed, 15 Jan 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-2682/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-2682&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 5.2.18 revision r123745&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-2674) Oracle VirtualBox OHCI Use-After-Free</title>
      <link>https://starlabs.sg/advisories/20/20-2674/</link>
      <pubDate>Tue, 14 Jan 2020 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-2674/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-2674&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 5.2.18 revision r123745&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-16452) Adobe Acrobat/Reader getSound JSObject Use-after-Free - TianFu Cup 2019</title>
      <link>https://starlabs.sg/advisories/19/19-16452/</link>
      <pubDate>Tue, 10 Dec 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-16452/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-16452&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Acrobat and Reader versions 2019.012.20035 and earlier&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). The basic Acrobat Reader, available for several desktop and mobile platforms, is freeware; it supports viewing, printing and annotating of PDF files. The commercial proprietary Acrobat, available for Microsoft Windows and macOS only, can also create, edit, convert, digitally sign, encrypt, export and publish PDF files.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-0889) Microsoft Jet Database Format Record Length Memory Corruption</title>
      <link>https://starlabs.sg/advisories/20/20-0889/</link>
      <pubDate>Wed, 04 Dec 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-0889/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-0889&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;msexcl40.dll 4.0.9801.17&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://microsoft.com&#34;&gt;https://microsoft.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;code&gt;msexcl40.dll&lt;/code&gt; is a part of Microsoft Jet Excel. It is responsible for processing Excel files. When opening a craft .xls file, especially when the &lt;code&gt;pExcelRecordBuffer&lt;/code&gt; is corrupt, this will cause an Out-of-Bounds write problem.&lt;/p&gt;&#xA;&lt;p&gt;The crash occurs at &lt;strong&gt;&lt;code&gt;msexcl40!WriteStringPool+0xa5&lt;/code&gt;&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0:000&amp;gt; r&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;eax=25c90000 ebx=256662ec ecx=00000000 edx=00000000 esi=00000000 edi=256662ec&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;eip=7ca9a905 esp=00f6ea8c ebp=00000000 iopl=0         nv up ei pl zr na pe nc&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;msexcl40!WriteStringPool+0xa5:&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;7ca9a905 8910            mov     dword ptr [eax],edx  ds:002b:25c90000=????????&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0:000&amp;gt; kb&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; # ChildEBP RetAddr  Args to Child              &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;00 00f6eab0 7ca98066 256657ac 256600fc 256657ac msexcl40!WriteStringPool+0xa5&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;01 00f6ead4 7ca8b496 256657ac 00000000 00000000 msexcl40!ExcelMISave+0x86&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;02 00f6eaf0 7ca84f41 256657ac 00000000 00000000 msexcl40!ExcelCloseFile+0x26&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;03 00f6eb08 7ca7d996 25665744 00000000 252aaf20 msexcl40!WorkbookClose+0x31&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;04 00f6eb24 7c83b36a 00000000 00000001 00000000 msexcl40!WBDBCloseDatabase+0xd6&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;05 00f6eb3c 7c81cf4c 252aaf20 000000ff 00000000 msjet40!ErrDispCloseDatabase+0x4a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;06 00f6eb50 7c77afb0 252aaf20 000000ff 00000000 msjet40!JetCloseDatabase+0x3c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;07 00f6ebd4 7c5643e9 25cafef4 00000000 25cb3fb0 msjetoledb40!CDBSession::~CDBSession+0x220&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;08 00f6ebe8 7c5a67fb 25cafee8 7c562a99 45181ec9 oledb32!CACMDynamic&amp;lt;CACMAggregationWrapper&amp;gt;::CmFinalRelease+0x5c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;09 00f6ebf0 7c562a99 45181ec9 27689fe0 7c562a40 oledb32!CSCM::FinalRelease+0xa&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0a 00f6ec14 7c53dd1c 25cafee8 2767fee8 00f6ec9c oledb32!CSCMComPolyObject&amp;lt;CSCM&amp;gt;::Release+0x59&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0b 00f6ec24 7c779255 25cafef4 f3aefcc7 2767fee8 oledb32!ATL::CComContainedObject&amp;lt;CACMAggregationWrapper&amp;gt;::Release+0x1c&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0c 00f6ec6c 00297521 274e4fdc 00000000 0032ae58 msjetoledb40!CCommand::~CCommand+0x175&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;code&gt;EAX&lt;/code&gt; should be &lt;strong&gt;&lt;code&gt;ExcelRecordBuffer&lt;/code&gt;&lt;/strong&gt; locates at &lt;strong&gt;&lt;code&gt;msexcl40!pExcelRecordBuffer&lt;/code&gt;&lt;/strong&gt;, but as we see, the value is corrupted&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-2902) Oracle VirtualBox Direct3D 9 Shader Out-of-Bounds Write Remote Code Execution Vulnerability</title>
      <link>https://starlabs.sg/advisories/20/20-2902/</link>
      <pubDate>Wed, 04 Dec 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-2902/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-2902&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Microsoft Direct3D 9 Runtime version 10.0.17763.1&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://microsoft.com&#34;&gt;https://microsoft.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TianFu Cup 2019</title>
      <link>https://starlabs.sg/achievements/tianfu-cup-2019/</link>
      <pubDate>Sun, 17 Nov 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/tianfu-cup-2019/</guid>
      <description>&lt;p&gt;The &lt;strong&gt;TianFu Cup&lt;/strong&gt; International Cyber Security Competition is China&amp;rsquo;s premier hacking competition for security practitioners — modelled after Pwn2Own, with all teams required to use original vulnerabilities to compromise their targets.&lt;/p&gt;&#xA;&lt;p&gt;Our researcher, Phan Thanh Duy, successfully pwned Adobe PDF Reader.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/TianFuCup-2019-16112019.png&#34; alt=&#34;TianFu Cup 2019 — results leaderboard&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://twitter.com/tianfucup/status/1195624774682038272&#34;&gt;Twitter: @tianfucup results&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>(CVE-2020-0961) Microsoft Jet Database file position integer overflow Memory Corruption</title>
      <link>https://starlabs.sg/advisories/20/20-0961/</link>
      <pubDate>Wed, 13 Nov 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/20/20-0961/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2020-0961&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;msexcl40.dll 4.0.9801.17&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://microsoft.com&#34;&gt;https://microsoft.com&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;code&gt;msexcl40.dll&lt;/code&gt; is a part of Microsoft Jet Excel, it is responsible for to process excel files when opening a specially crafted .xls file, an memory corruption will occur.&lt;/p&gt;&#xA;&lt;p&gt;The crash occurs at &lt;strong&gt;&lt;code&gt;msexcl40!memcpy+0x2a&lt;/code&gt;&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;(42b8.1bc0): Access violation - code c0000005 (first/second chance not available)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;First chance exceptions are reported before any exception handling.&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;This exception may be expected and handled.&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;eax=9f33c218 ebx=00000004 ecx=00000004 edx=00000004 esi=9f33c214 edi=00b3e080&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;eip=5374abda esp=00b3e00c ebp=00b3e1cc iopl=0         nv up ei pl nz ac pe cy&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000217&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;msexcl40!memcpy+0x2a:&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;5374abda f3a4            rep movs byte ptr es:[edi],byte ptr [esi]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0:000&amp;gt; kb&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt; # ChildEBP RetAddr  Args to Child              &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;00 00b3e010 5373b647 00b3e080 9f33c214 00000004 msexcl40!memcpy+0x2a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;01 00b3e028 5372cd8d 25111a7a 00b3e080 00000004 msexcl40!BFReadFile+0x57&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;02 00b3e1cc 537276c4 251117de 5375c770 00000000 msexcl40!ExcelScanFile+0x12d&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;03 00b3e1e0 53727c8e 25111776 00000000 00b3e324 msexcl40!NextName+0x24&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;04 00b3e200 5371cc1a 25111776 00b3e324 00000100 msexcl40!WorkbookNameFirst+0x2e&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;05 00b3e524 5371dc52 251127a6 256a6168 00b3e54c msexcl40!LocateTableInDatabase+0x28a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;06 00b3eb6c 7b8bb575 20a16f20 00000001 256a6168 msexcl40!WBDBDeleteTable+0x1f2&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;07 00b3eb80 7b89b716 20a16f20 000000ff 256a6168 msjet40!ErrDispDeleteTable+0x35&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;08 00b3eb9c 7b978e1a 20a16f20 000000ff 256a6168 msjet40!ErrDeleteTable+0x56&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;09 00b3ed98 7b9449c8 20a16f20 000000ff 000007ff msjet40!ErrExecuteDDL+0xe2e&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0a 00b3edc8 7b94634d 20a16f20 000000ff 000007ff msjet40!ErrExecuteTempQuery+0xa0&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0b 00b3edf8 7b7f5d40 20a16f20 000000ff 000007ff msjet40!JetExecuteTempQuery+0x90&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0c 00b3eea4 7b64d303 25630ff0 25652f34 7b5c48bc msjetoledb40!CImpICommandText::Execute+0x390&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;0d 00b3efdc 00707521 25648fdc 00000000 0079ae58 oledb32!CCommandText::Execute+0x313&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;From the crash, we get to know that the source address of &lt;code&gt;memcpy&lt;/code&gt; is wrong. In our case, it is &lt;code&gt;0x9f33c214&lt;/code&gt;. Through reverse  engineering, we found this value comes from &lt;code&gt;[EDI+0x8]&lt;/code&gt; at &lt;code&gt;0x1002B611&lt;/code&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-1406) Microsoft Jet Engine ColumnLvText Type Confusion</title>
      <link>https://starlabs.sg/advisories/19/19-1406/</link>
      <pubDate>Tue, 12 Nov 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-1406/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-1406&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Windows 10 version 1903 and below&lt;/li&gt;&#xA;&lt;li&gt;Windows 7&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.microsoft.com&#34;&gt;https://www.microsoft.com&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;The Microsoft Jet Database Engine (also Microsoft JET Engine or simply Jet) is a database engine on which several Microsoft products have been built. JET stands for Joint Engine Technology. Microsoft Access and Visual Basic have used Jet as their underlying database engine.&lt;/p&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;The vulnerable DLL &lt;code&gt;msjet40.dll&lt;/code&gt; is a component in versions from Windows 7 to Windows 10. The vulnerability described here can be triggered with a specially-crafted MDB file, and could lead to code execution.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-2984) Oracle VirtualBox Video Hardware Acceleration NULL Pointer Dereferences</title>
      <link>https://starlabs.sg/advisories/19/19-2984/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-2984/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-2984&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;: Oracle VirtualBox 5.2.18 revision r123745&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;VirtualBox&lt;/strong&gt; is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;&#xA;&lt;p&gt;There are several interfaces for the guest to communicate with the host in VirtualBox, one of them is Host-Guest Shared Memory Interface (HGSMI) services. These vulnerabilities occur in the VirtualBox Video Acceleration (VBVA) channel, which works on top of HGSMI.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-3002) Oracle VirtualBox Integer Divide by Zero in hdaR3StreamInit</title>
      <link>https://starlabs.sg/advisories/19/19-3002/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-3002/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-3002&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.0.4 revision r128413&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;Intel HD Audio (HDA)&lt;/strong&gt; is the default VirtualBox Audio Controller for Windows guests. The vulnerability occurs while processing an audio stream which the guest sends to the host via this emulated device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-3005) Oracle VirtualBox NULL Pointer Dereference in hdaR3WalClkSet</title>
      <link>https://starlabs.sg/advisories/19/19-3005/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-3005/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-3005&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.0.4 revision r128413&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;Intel HD Audio (HDA)&lt;/strong&gt; is the default VirtualBox Audio Controller for Windows guests. The vulnerability occurs while processing an audio stream which the guest sends to the host via this emulated device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-3026) Oracle VirtualBox VBoxSVGA Invalid Check in vmsvgaFIFOLoop</title>
      <link>https://starlabs.sg/advisories/19/19-3026/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-3026/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-3026&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.0.4 revision r128413&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;VboxSVGA&lt;/strong&gt; is the default Video Adapter for Windows guests. The vulnerability occurs while processing an SVGA command which the guest send to the host.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-3031) Oracle VirtualBox VMSVGA Out-of-Bounds Read in vmsvga3dSetLightEnabled</title>
      <link>https://starlabs.sg/advisories/19/19-3031/</link>
      <pubDate>Sun, 20 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-3031/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-3031&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.0.4 revision r128413&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Besides the default &lt;em&gt;VirtualBox Video Adapter&lt;/em&gt;, VirtualBox also emulates &lt;strong&gt;VMware virtual SVGA&lt;/strong&gt; device. It is not enabled by default.&#xA;The vulnerability occurs while processing a SVGA command which the guest send to the host.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HITB Driven2Pwn 2019</title>
      <link>https://starlabs.sg/achievements/hitb-driven2pwn-2019/</link>
      <pubDate>Thu, 17 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/hitb-driven2pwn-2019/</guid>
      <description>&lt;p&gt;HITB &lt;strong&gt;Driven2Pwn&lt;/strong&gt; is the UAE&amp;rsquo;s first bug bounty buffet event — a one-stop collaborative bounty organised by Hack In The Box, VXRL and Vulnerability Labs.&lt;/p&gt;&#xA;&lt;p&gt;Our researcher, Pham Hong Phi, successfully pwned Oracle VirtualBox in the Virtualization Category.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/Driven2Pwn-2019-VirtualBox-16102019.jpg&#34; alt=&#34;Driven2Pwn 2019 — VirtualBox exploit&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://starlabs.sg/achievements/images/Driven2Pwn-2019-VirtualBox-Success-16102019.jpg&#34; alt=&#34;Driven2Pwn 2019 — success confirmation&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://twitter.com/driven2pwn/status/1184458553978953728&#34;&gt;Twitter: @driven2pwn announcement&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-8220) Adobe Reader CLstBxField Use-after-Free</title>
      <link>https://starlabs.sg/advisories/19/19-8220/</link>
      <pubDate>Tue, 15 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-8220/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-8220&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Acrobat and Reader DC versions 2019.012.20040 and earlier&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&lt;/p&gt;&#xA;&lt;p&gt;Both Adobe Reader and Acrobat DC share the same &lt;code&gt;DigSig.api&lt;/code&gt; plugin:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Image path: C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\plug_ins\DigSig.api&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;File Version Number: 19.10.20064.48846&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Product Version Number:  19.10.20064.48846&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Comments:  The Digital Signature plug-in (DigSig) provides a generic PDF file digital-signing service. [...]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Company Name:  Adobe Systems Incorporated&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;File Description:  Adobe Acrobat Digital Signature Plug-in&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;File Version:  19.10.20064.310990&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Legal Copyright: Copyright 1984-2018 Adobe Systems Incorporated and its licensors. All rights reserved.&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Product Name:  Adobe Acrobat Digital Signature Plug-in&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Product Version: 19.10.20064.310990&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;There is a use-after-free bug when Acrobat Reader executes Javascript related to &lt;code&gt;Document.Field&lt;/code&gt; object.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-8221) Adobe Reader Type Confusion in getColorConvertAction</title>
      <link>https://starlabs.sg/advisories/19/19-8221/</link>
      <pubDate>Tue, 15 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-8221/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-8221&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Acrobat DC version 2019.008.20064 (Windows 10 64-bit)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&lt;/p&gt;&#xA;&lt;p&gt;Both Adobe Reader and Acrobat DC share the same &lt;code&gt;Escript.api&lt;/code&gt; plugin:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Image path: C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\plug_ins\EScript.api&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Image name: EScript.api&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Browse all global symbols  functions  data&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Timestamp:        Tue Dec  4 10:46:45 2018 (5C06CB95)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;CheckSum:         00000000&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ImageSize:        002AB000&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;File version:     19.10.20064.48846&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Product version:  19.10.20064.48846&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;File flags:       0 (Mask 3F)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;File OS:          4 Unknown Win32&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;File type:        2.0 Dll&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;File date:        00000000.00000000&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Translations:     0409.04b0&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Information from resource tables:&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    CompanyName:      Adobe Systems Incorporated&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    ProductName:      Adobe Acrobat Escript&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    InternalName:     Escript&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    OriginalFilename: Escript.api&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    ProductVersion:   19.10.20064.310990&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    FileVersion:      19.10.20064.310990&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    FileDescription:  Adobe Acrobat Escript Plug-in&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h1 id=&#34;technical-details&#34;&gt;Technical Details&lt;/h1&gt;&#xA;&lt;p&gt;There is type-confusion because the &lt;code&gt;colorConvertPage&lt;/code&gt; function does not check the object type.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-1250) Microsoft Jet database Record::IsNull Memory Corruption</title>
      <link>https://starlabs.sg/advisories/19/19-1250/</link>
      <pubDate>Tue, 10 Sep 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-1250/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-1250&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Windows 10 version 1903 and below&lt;/li&gt;&#xA;&lt;li&gt;Windows 7&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.microsoft.com&#34;&gt;https://www.microsoft.com&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;The Microsoft Jet Database Engine (also Microsoft JET Engine or simply Jet) is a database engine on which several Microsoft products have been built. JET stands for Joint Engine Technology. Microsoft Access and Visual Basic have used Jet as their underlying database engine.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;The vulnerable DLL &lt;code&gt;msrd3x40.dll&lt;/code&gt; is a component in versions from Windows 7 to Windows 10. The vulnerability described here can be triggered with a specially-crafted MDB file, and could lead to code execution.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-8011) Acrobat Reader DC 2d.x3d!_LoadTIFF() Out-of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/19/19-8011/</link>
      <pubDate>Tue, 13 Aug 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-8011/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-8011&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20099&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-8018) Acrobat Reader DC 2d.x3d!_LoadRGB() OOB Read in TRGB::expandrow()</title>
      <link>https://starlabs.sg/advisories/19/19-8018/</link>
      <pubDate>Tue, 13 Aug 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-8018/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-8018&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20099&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-8038) Adobe Acrobat/Reader CTextWidget Use-after-Free</title>
      <link>https://starlabs.sg/advisories/19/19-8038/</link>
      <pubDate>Thu, 20 Jun 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-8038/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-8038&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Acrobat and Reader versions 2019.012.20035 and earlier&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). The basic Acrobat Reader, available for several desktop and mobile platforms, is freeware; it supports viewing, printing and annotating of PDF files. The commercial proprietary Acrobat, available for Microsoft Windows and macOS only, can also create, edit, convert, digitally sign, encrypt, export and publish PDF files.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-8039) Adobe Acrobat/Reader CTextField Use-after-Free</title>
      <link>https://starlabs.sg/advisories/19/19-8039/</link>
      <pubDate>Thu, 20 Jun 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-8039/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-8039&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Acrobat and Reader versions 2019.012.20035 and earlier&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF). The basic Acrobat Reader, available for several desktop and mobile platforms, is freeware; it supports viewing, printing and annotating of PDF files. The commercial proprietary Acrobat, available for Microsoft Windows and macOS only, can also create, edit, convert, digitally sign, encrypt, export and publish PDF files.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-7142) Acrobat Reader DC 2d.x3d!_LoadRGB() Out-of-Bounds Read/Write in TRGB::expandrow()</title>
      <link>https://starlabs.sg/advisories/19/19-7142/</link>
      <pubDate>Tue, 14 May 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-7142/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-7142&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20099&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-8010) Acrobat Reader DC 2d.x3d!_LoadTIFF() Out-of-Bounds Read</title>
      <link>https://starlabs.sg/advisories/19/19-8010/</link>
      <pubDate>Tue, 07 May 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-8010/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-8010&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20099&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-7118) Acrobat Reader DC 2d.x3d!_LoadRGB() Out-of-Bounds Write in TRGB::Read()</title>
      <link>https://starlabs.sg/advisories/19/19-7118/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-7118/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-7118&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20064&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-7119) Acrobat Reader DC 2d.x3d!_LoadRGB() Out-of-Bounds Write in TRGB::Read()</title>
      <link>https://starlabs.sg/advisories/19/19-7119/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-7119/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-7119&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20064&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-7120) Acrobat Reader DC 2d.x3d!_LoadILBM() Out-of-Bounds Read in TIF::Read()</title>
      <link>https://starlabs.sg/advisories/19/19-7120/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-7120/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-7120&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20064&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-7121) Acrobat Reader DC 2d.x3d!_LoadILBM() Out-of-Bounds Read in TIF::Read()</title>
      <link>https://starlabs.sg/advisories/19/19-7121/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-7121/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-7121&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20064&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-7122) Acrobat Reader DC 2d.x3d!_LoadTIFF() Out-of-Bounds Read in TTIFFread::TifReadChunkyRGB()</title>
      <link>https://starlabs.sg/advisories/19/19-7122/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-7122/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-7122&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20064&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-7123) Acrobat Reader DC 2d.x3d!_LoadRGB() Memory Corruption in TRGB::expandrow()</title>
      <link>https://starlabs.sg/advisories/19/19-7123/</link>
      <pubDate>Tue, 09 Apr 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-7123/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-7123&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20064&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn2Own Vancouver 2019</title>
      <link>https://starlabs.sg/achievements/pwn2own-vancouver-2019/</link>
      <pubDate>Fri, 22 Mar 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/achievements/pwn2own-vancouver-2019/</guid>
      <description>&lt;p&gt;Pwn2Own is a computer hacking contest held annually by Trend Micro&amp;rsquo;s Zero Day Initiative - ZDI. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The total prize for each contest is up to millions of dollars.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.zerodayinitiative.com/blog/2019/1/14/pwn2own-vancouver-2019-tesla-vmware-microsoft-and-more&#34;&gt;2019 spring edition of Pwn2Own (Pwn2Own Vancouver)&lt;/a&gt; was held from 20th March to 22nd March 2019.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-2722) Oracle VirtualBox e1000 Integer Underflow - Pwn2Own</title>
      <link>https://starlabs.sg/advisories/19/19-2722/</link>
      <pubDate>Wed, 20 Mar 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-2722/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-2722&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Oracle VirtualBox 5.2.28 and earlier&lt;/li&gt;&#xA;&lt;li&gt;Oracle VirtualBox 6.0.6 and earlier&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://virtualbox.org&#34;&gt;https://virtualbox.org&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;VirtualBox is a x86 and AMD64/Intel64 virtualization product for enterprise as well as home use.&#xA;It is a solution commercially supported by Oracle, in addition to being made available as open source software. It runs on various host platforms like Windows, Linux, Mac and Solaris and also supports a large number of guest operating systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-9133) KMPlayer Subtitles Parser Integer Overflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/19/19-9133/</link>
      <pubDate>Thu, 07 Mar 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-9133/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-9133&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;KMPlayer 4.2.2.12 KMP Plus&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;http://www.kmplayer.com/&#34;&gt;http://www.kmplayer.com/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;K-Multimedia Player (KMPlayer) is a media player for Windows which can play a large number of formats including VCD, DVD, AVI, MKV, Ogg, OGM, 3GP, MPEG-1/2/4, AAC, WMA 7, 8, WMV, RealMedia, FLV and QuickTime.&#xA;When processing &lt;code&gt;.sup&lt;/code&gt; files, KMPlayer doesn&amp;rsquo;t check the Object size correctly, which leads to integer overflow then to memory out-of-bound read.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2018-20334) ASUSWRT Command Injection in start_apply.htm</title>
      <link>https://starlabs.sg/advisories/18/18-20334/</link>
      <pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/18/18-20334/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2018-20334&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;: ASUSWRT 3.0.0.4.384.20308 (2018/02/01)&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.asus.com/us/ASUSWRT/&#34;&gt;https://www.asus.com/us/ASUSWRT/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;ASUSWRT&lt;/strong&gt; is the firmware that is shipped with modern ASUS routers.&#xA;ASUSWRT has a web-based interface, so it doesn&amp;rsquo;t need a separate app, or restrict what you can change via mobile devices &amp;ndash; you get full access to everything, from any device that can run a web browser.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;When processing the POST data, there is a command injection issue.  By using this issue, an attacker can control the router.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2018-20335) ASUSWRT Denial of Service of HTTP Service</title>
      <link>https://starlabs.sg/advisories/18/18-20335/</link>
      <pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/18/18-20335/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2018-20335&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;: ASUSWRT 3.0.0.4.384.20308 (2018/02/01)&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.asus.com/us/ASUSWRT/&#34;&gt;https://www.asus.com/us/ASUSWRT/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;ASUSWRT&lt;/strong&gt; is the firmware that is shipped with modern ASUS routers.&#xA;ASUSWRT has a web-based interface, so it doesn&amp;rsquo;t need a separate app, or restrict what you can change via mobile devices &amp;ndash; you get full access to everything, from any device that can run a web browser.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;An unauthenticated user can trigger a &lt;em&gt;DoS (Denial of Service)&lt;/em&gt; of the &lt;code&gt;httpd&lt;/code&gt; service in ASUSWRT.&#xA;The cause of this bug is a cookie sent in a HTTP request.&#xA;When &lt;code&gt;httpd&lt;/code&gt; tries to process the line &lt;code&gt;Cookie: asus_token=tV8OTWWNqXmrH&lt;/code&gt;&#xA;in the &lt;code&gt;handle_request&lt;/code&gt; function,  it hangs at in a call to &lt;code&gt;fgets&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2018-20336) ASUSWRT Stack Overflow in wanduck.c</title>
      <link>https://starlabs.sg/advisories/18/18-20336/</link>
      <pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/18/18-20336/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2018-20336&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;: ASUSWRT 3.0.0.4.384.20308 (2018/02/01)&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.asus.com/us/ASUSWRT/&#34;&gt;https://www.asus.com/us/ASUSWRT/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;ASUSWRT&lt;/strong&gt; is the firmware that is shipped with modern ASUS routers.&#xA;ASUSWRT has a web-based interface, so it doesn&amp;rsquo;t need a separate app, or restrict what you can change via mobile devices &amp;ndash; you get full access to everything, from any device that can run a web browser.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;There is a stack overflow issue in &lt;em&gt;&lt;strong&gt;parse_req_queries&lt;/strong&gt;&lt;/em&gt; function in &lt;em&gt;&lt;strong&gt;wanduck.c&lt;/strong&gt;&lt;/em&gt;,&#xA;which may lead to information leak.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-16340) Linksys Velop Authentication Bypass</title>
      <link>https://starlabs.sg/advisories/19/19-16340/</link>
      <pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-16340/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-16340&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Linksys Velop 1.1.2.185309&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.linksys.com/us/velop/&#34;&gt;https://www.linksys.com/us/velop/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Velop is a WHOLE HOMEMESH Wi-Fi system from LINKSYS. It allows users to enjoy fast, nonstop Wi-Fi everywhere with Velop’s modular easy-to-use Wi-Fi Mesh system.&lt;/p&gt;&#xA;&lt;p&gt;There are three categories from their &lt;a href=&#34;https://www.linksys.com/us/c/whole-home-mesh-wifi/&#34;&gt;official site&lt;/a&gt;: WHW0303, WHW0302, WHW0301.&lt;/p&gt;&#xA;&lt;p&gt;The differences between these three are the pack count: 1, 2 or 3. The system is the same.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;There are many information leak problems; one of them is through &lt;strong&gt;&lt;code&gt;/sysinfo_json.cgi&lt;/code&gt;&lt;/strong&gt;, requesting this URL will leak sensitive information and may lead to authentication bypass.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-7035) Acrobat Reader DC 2d.x3d!_LoadGIF() Arbitrary Write in TGIF::PutPixel()</title>
      <link>https://starlabs.sg/advisories/19/19-7035/</link>
      <pubDate>Tue, 12 Feb 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-7035/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-7035&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Adobe Reader DC 2019.010.20064&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://acrobat.adobe.com/us/en/acrobat.html&#34;&gt;https://acrobat.adobe.com/us/en/acrobat.html&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://get.adobe.com/reader/&#34;&gt;https://get.adobe.com/reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage files in Portable Document Format (PDF).&#xA;It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via &lt;code&gt;3difr.x3d&lt;/code&gt;, &lt;code&gt;2d.x3d&lt;/code&gt; and &lt;code&gt;rt3d.dll&lt;/code&gt;, which allow viewing embedded 3D contents in PDF files. The ECMA-363 standard allows external texture images to be encoded with the Texture Resource Declaration Block, with options to load either JPEG/PNG images embedded in the PDF file, or other image types from the local file system.&#xA;These external image formats include TGA, TIFF, PIC, GIF, BMP, PCX, PPM, IFF, FLI/FLC, RGB, PSD, RLE and CEL. The 2d.x3d module is activated when the users choose to enable 3D content display.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-16337) Hancom Office Use-after-Free in HncBD90</title>
      <link>https://starlabs.sg/advisories/19/19-16337/</link>
      <pubDate>Thu, 10 Jan 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-16337/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-16337&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Hancom Office NEO (HncBD90 version 9.6.1.9403)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.hancom.com/cs_center/csDownload.do&#34;&gt;https://www.hancom.com/cs_center/csDownload.do&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Hangul Office is published by Hancom, Inc. and is considered one of the more popular Office suites used within South Korea. When opening a specially crafted Office Open XML Workbook (.xlsx), HncBD90 uses &lt;code&gt;realloc&lt;/code&gt; function to reallocate a memory buffer, but after the &lt;code&gt;realloc&lt;/code&gt; it continues using the old pointer that has been freed, resulting in a use-after-free vulnerability. This could lead to code execution under the context of the application.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-16338) Hancom Office tfo_common Object Use-after-Free in HwordApp</title>
      <link>https://starlabs.sg/advisories/19/19-16338/</link>
      <pubDate>Thu, 10 Jan 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-16338/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-16338&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Hancom Office NEO (HwordApp)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.hancom.com/cs_center/csDownload.do&#34;&gt;https://www.hancom.com/cs_center/csDownload.do&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;Hangul Office is published by Hancom, Inc. and is considered one of the more popular Office suites used within South Korea.&#xA;When opening a specially crafted Office Open XML Document (.docx), HwordApp does not properly process a &lt;code&gt;tfo_common&lt;/code&gt; object which will cause a use-after-free.&#xA;This may lead to code execution under the context of the application.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-16339) Hancom Hcell Unspecified Memory Corruption</title>
      <link>https://starlabs.sg/advisories/19/19-16339/</link>
      <pubDate>Wed, 09 Jan 2019 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-16339/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-16339&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;HCell.exe 9.6.1.7363&lt;/li&gt;&#xA;&lt;li&gt;SDSerialize 9.6.1.9403&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&#xA;&lt;a href=&#34;https://www.hancom.com/cs_center/csDownload.do&#34;&gt;https://www.hancom.com/cs_center/csDownload.do&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Hangul Office is published by Hancom, Inc. and is considered one of the more popular Office suites used within South Korea. This vulnerability was discovered within the SDSerialize.dll when opening a specially crafted Office Open XML Workbook (.xlsx). This is part of the Hangul Office Suite.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#e6edf3;background-color:#0d1117;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-gdscript3&#34; data-lang=&#34;gdscript3&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt;:&lt;span style=&#34;color:#a5d6ff&#34;&gt;000&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;&amp;gt;&lt;/span&gt; lmvm SDSerialize&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;start    end        module name&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;6&lt;/span&gt;eca0000 &lt;span style=&#34;color:#a5d6ff&#34;&gt;6&lt;/span&gt;ed36000   SDSerialize   (&lt;span style=&#34;color:#ff7b72&#34;&gt;export&lt;/span&gt; symbols)       C:\Program Files (x86)\Hnc\Office NEO\HOffice96\Bin\SDSerialize&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;dll&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    Loaded symbol image file: C:\Program Files (x86)\Hnc\Office NEO\HOffice96\Bin\SDSerialize&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;dll&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;Image&lt;/span&gt; path: C:\Program Files (x86)\Hnc\Office NEO\HOffice96\Bin\SDSerialize&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;dll&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;Image&lt;/span&gt; name: SDSerialize&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;dll&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    Timestamp:        Thu Apr &lt;span style=&#34;color:#a5d6ff&#34;&gt;12&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;17&lt;/span&gt;:&lt;span style=&#34;color:#a5d6ff&#34;&gt;20&lt;/span&gt;:&lt;span style=&#34;color:#a5d6ff&#34;&gt;43&lt;/span&gt; &lt;span style=&#34;color:#a5d6ff&#34;&gt;2018&lt;/span&gt; (&lt;span style=&#34;color:#a5d6ff&#34;&gt;5&lt;/span&gt;ACF24EB)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    CheckSum:         &lt;span style=&#34;color:#a5d6ff&#34;&gt;0005&lt;/span&gt;FF4F&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    ImageSize:        &lt;span style=&#34;color:#a5d6ff&#34;&gt;00096000&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;File&lt;/span&gt; version:     &lt;span style=&#34;color:#a5d6ff&#34;&gt;9.6&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1.9403&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    Product version:  &lt;span style=&#34;color:#a5d6ff&#34;&gt;9.6&lt;/span&gt;&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#a5d6ff&#34;&gt;1.9403&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;File&lt;/span&gt; flags:       &lt;span style=&#34;color:#a5d6ff&#34;&gt;0&lt;/span&gt; (Mask &lt;span style=&#34;color:#a5d6ff&#34;&gt;3&lt;/span&gt;F)&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;File&lt;/span&gt; &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;OS&lt;/span&gt;:          &lt;span style=&#34;color:#a5d6ff&#34;&gt;4&lt;/span&gt; Unknown Win32&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;File&lt;/span&gt; type:        &lt;span style=&#34;color:#a5d6ff&#34;&gt;2.0&lt;/span&gt; Dll&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f0883e;font-weight:bold&#34;&gt;File&lt;/span&gt; date:        &lt;span style=&#34;color:#a5d6ff&#34;&gt;00000000.00000000&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    Translations:     &lt;span style=&#34;color:#a5d6ff&#34;&gt;0409.04&lt;/span&gt;b0&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    CompanyName:      Hancom Inc&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    ProductName:      Hancom, Inc&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;  Common Library &lt;span style=&#34;color:#a5d6ff&#34;&gt;9.0&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    InternalName:     SDSERIALIZE&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;DLL&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    OriginalFilename: SDSerialize&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;dll&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    ProductVersion:   &lt;span style=&#34;color:#a5d6ff&#34;&gt;9&lt;/span&gt;, &lt;span style=&#34;color:#a5d6ff&#34;&gt;6&lt;/span&gt;, &lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;, &lt;span style=&#34;color:#a5d6ff&#34;&gt;9403&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    FileVersion:      &lt;span style=&#34;color:#a5d6ff&#34;&gt;9&lt;/span&gt;, &lt;span style=&#34;color:#a5d6ff&#34;&gt;6&lt;/span&gt;, &lt;span style=&#34;color:#a5d6ff&#34;&gt;1&lt;/span&gt;, &lt;span style=&#34;color:#a5d6ff&#34;&gt;9403&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    FileDescription:  Hancom Inc&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;  SDSerialize &lt;span style=&#34;color:#a5d6ff&#34;&gt;9.0&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    LegalCopyright:   Copyright &lt;span style=&#34;color:#a5d6ff&#34;&gt;1989.&lt;/span&gt; Hancom Inc&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt; All rights reserved&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    LegalTrademarks:  SDSERIALIZE is a registered trademark of Hancom Inc&lt;span style=&#34;color:#ff7b72;font-weight:bold&#34;&gt;.&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;[NOTE]&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2018-20333) ASUSWRT Information Disclosure on update_applist.asp</title>
      <link>https://starlabs.sg/advisories/18/18-20333/</link>
      <pubDate>Fri, 21 Dec 2018 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/18/18-20333/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2018-20333&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;: ASUSWRT 3.0.0.4.384.20308 (2018/02/01)&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.asus.com/us/ASUSWRT/&#34;&gt;https://www.asus.com/us/ASUSWRT/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;ASUSWRT&lt;/strong&gt; is the firmware that is shipped with modern ASUS routers.&#xA;ASUSWRT has a web-based interface, so it doesn&amp;rsquo;t need a separate app, or restrict what you can change via mobile devices &amp;ndash; you get full access to everything, from any device that can run a web browser.&lt;/p&gt;&#xA;&lt;h1 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;An unauthenticated user can request the &lt;code&gt;http://&amp;lt;ROUTERIP&amp;gt;/update_applist.asp&lt;/code&gt; to see if a USB device is attached to the router and if there are apps installed on the router.&#xA;Although getting to know if a USB storage is attached to the device does seems not a vulnerability,&#xA;this will let the attacker knows more about the router.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-6984) Foxit Reader U3D Shading Modifier Block Integer Overflow Vulnerability</title>
      <link>https://starlabs.sg/advisories/19/19-6984/</link>
      <pubDate>Wed, 28 Nov 2018 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-6984/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-6984&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Foxit Reader 9.1.0.5096, U3DBrowser.fpi 9.1.0.425&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.foxitsoftware.com/pdf-reader/&#34;&gt;https://www.foxitsoftware.com/pdf-reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;Foxit Reader&lt;/strong&gt; is a popular PDF reading and printing software. It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via the U3DBrowser plug-in, which allows viewing embedded 3D annotations in PDF files. Up to version 9.0.1.1049 the plug-in is loaded in its default installation package, subsequent version continues the support to its user base with the plug-in separately acquired.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-6985) Foxit Reader U3D 2D Glyph Modifier Block Use-after-Free Vulnerability</title>
      <link>https://starlabs.sg/advisories/19/19-6985/</link>
      <pubDate>Wed, 28 Nov 2018 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-6985/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-6985&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Foxit Reader 9.1.0.5096, U3DBrowser.fpi 9.1.0.425&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.foxitsoftware.com/pdf-reader/&#34;&gt;https://www.foxitsoftware.com/pdf-reader/&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;description-of-the-vulnerability&#34;&gt;Description of the vulnerability&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;Foxit Reader&lt;/strong&gt; is a popular PDF reading and printing software. It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via the U3DBrowser plug-in, which allows viewing embedded 3D annotations in PDF files. Up to version 9.0.1.1049 the plug-in is loaded in its default installation package, subsequent version continues the support to its user base with the plug-in separately acquired.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-6982) Foxit Reader U3D CLOD Mesh Declaration OOB Write</title>
      <link>https://starlabs.sg/advisories/19/19-6982/</link>
      <pubDate>Tue, 27 Nov 2018 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-6982/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-6982&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;: Foxit Reader 9.0.1.1049, U3DBrowser.fpi 9.0.1.994&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.foxitsoftware.com/pdf-reader/&#34;&gt;https://www.foxitsoftware.com/pdf-reader/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Foxit Reader&lt;/strong&gt; is a popular PDF reading and printing software. It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via the U3DBrowser plug-in, which allows viewing embedded 3D annotations in PDF files. Up to version 9.0.1.1049 the plug-in is loaded in its default installation package, subsequent version continues the support to its user base with the plug-in separately acquired.&lt;/p&gt;</description>
    </item>
    <item>
      <title>(CVE-2019-6983) Foxit Reader U3D File Header Block Heap Overflow</title>
      <link>https://starlabs.sg/advisories/19/19-6983/</link>
      <pubDate>Tue, 27 Nov 2018 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/advisories/19/19-6983/</guid>
      <description>&lt;p&gt;&lt;strong&gt;CVE&lt;/strong&gt;: CVE-2019-6983&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Tested Versions&lt;/strong&gt;: Foxit Reader 9.1.0.5096, U3DBrowser.fpi 9.1.0.425&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Product URL(s)&lt;/strong&gt;: &lt;a href=&#34;https://www.foxitsoftware.com/pdf-reader/&#34;&gt;https://www.foxitsoftware.com/pdf-reader/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Foxit Reader&lt;/strong&gt; is a popular PDF reading and printing software. It provides compatibility to the ECMA-363 Standard (Universal 3D File Format) via the U3DBrowser plug-in, which allows viewing embedded 3D annotations in PDF files. Up to version 9.0.1.1049 the plug-in is loaded in its default installation package, subsequent version continues the support to its user base with the plug-in separately acquired.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Alicia Ho</title>
      <link>https://starlabs.sg/team/alicia-ho/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/alicia-ho/</guid>
      <description></description>
    </item>
    <item>
      <title>Billy Jheng Bing-Jhong</title>
      <link>https://starlabs.sg/team/billy-jheng-bing-jhong/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/billy-jheng-bing-jhong/</guid>
      <description></description>
    </item>
    <item>
      <title>Bruce Chen Yu-Jen</title>
      <link>https://starlabs.sg/team/bruce-chen-yu-jen/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/bruce-chen-yu-jen/</guid>
      <description></description>
    </item>
    <item>
      <title>Carol Ng</title>
      <link>https://starlabs.sg/team/carol-ng/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/carol-ng/</guid>
      <description></description>
    </item>
    <item>
      <title>Chen Le Qi</title>
      <link>https://starlabs.sg/team/chen-le-qi/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/chen-le-qi/</guid>
      <description></description>
    </item>
    <item>
      <title>Cherie-Anne Lee</title>
      <link>https://starlabs.sg/team/cherie-anne-lee/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/cherie-anne-lee/</guid>
      <description></description>
    </item>
    <item>
      <title>Daniel Lim Wee Soong</title>
      <link>https://starlabs.sg/team/daniel-lim-wee-soong/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/daniel-lim-wee-soong/</guid>
      <description></description>
    </item>
    <item>
      <title>Đào Tuấn Linh</title>
      <link>https://starlabs.sg/team/%C4%91%C3%A0o-tu%E1%BA%A5n-linh/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/%C4%91%C3%A0o-tu%E1%BA%A5n-linh/</guid>
      <description></description>
    </item>
    <item>
      <title>Darell Tan</title>
      <link>https://starlabs.sg/team/darell-tan/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/darell-tan/</guid>
      <description></description>
    </item>
    <item>
      <title>Đỗ Mạnh Dũng</title>
      <link>https://starlabs.sg/team/%C4%91%E1%BB%97-m%E1%BA%A1nh-d%C5%A9ng/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/%C4%91%E1%BB%97-m%E1%BA%A1nh-d%C5%A9ng/</guid>
      <description></description>
    </item>
    <item>
      <title>Đỗ Minh Tuấn</title>
      <link>https://starlabs.sg/team/%C4%91%E1%BB%97-minh-tu%E1%BA%A5n/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/%C4%91%E1%BB%97-minh-tu%E1%BA%A5n/</guid>
      <description></description>
    </item>
    <item>
      <title>Dr. Wei Lei</title>
      <link>https://starlabs.sg/team/dr.-wei-lei/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/dr.-wei-lei/</guid>
      <description></description>
    </item>
    <item>
      <title>Frances Ciara Loy</title>
      <link>https://starlabs.sg/team/frances-ciara-loy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/frances-ciara-loy/</guid>
      <description></description>
    </item>
    <item>
      <title>Hung Tien Tran</title>
      <link>https://starlabs.sg/team/hung-tien-tran/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/hung-tien-tran/</guid>
      <description></description>
    </item>
    <item>
      <title>Jacob Soo</title>
      <link>https://starlabs.sg/team/jacob-soo/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/jacob-soo/</guid>
      <description></description>
    </item>
    <item>
      <title>Joel Wong</title>
      <link>https://starlabs.sg/team/joel-wong/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/joel-wong/</guid>
      <description></description>
    </item>
    <item>
      <title>Lauren Chua</title>
      <link>https://starlabs.sg/team/lauren-chua/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/lauren-chua/</guid>
      <description></description>
    </item>
    <item>
      <title>Lê Hữu Quang Linh</title>
      <link>https://starlabs.sg/team/l%C3%AA-h%E1%BB%AFu-quang-linh/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/l%C3%AA-h%E1%BB%AFu-quang-linh/</guid>
      <description></description>
    </item>
    <item>
      <title>Li Jiantao</title>
      <link>https://starlabs.sg/team/li-jiantao/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/li-jiantao/</guid>
      <description></description>
    </item>
    <item>
      <title>Lucas Tay</title>
      <link>https://starlabs.sg/team/lucas-tay/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/lucas-tay/</guid>
      <description></description>
    </item>
    <item>
      <title>Manzel Joseph Seet</title>
      <link>https://starlabs.sg/team/manzel-joseph-seet/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/manzel-joseph-seet/</guid>
      <description></description>
    </item>
    <item>
      <title>Meysam Firouzi</title>
      <link>https://starlabs.sg/team/meysam-firouzi/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/meysam-firouzi/</guid>
      <description></description>
    </item>
    <item>
      <title>Muhammad Alifa Ramdhan</title>
      <link>https://starlabs.sg/team/muhammad-alifa-ramdhan/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/muhammad-alifa-ramdhan/</guid>
      <description></description>
    </item>
    <item>
      <title>Ngo Wei Lin</title>
      <link>https://starlabs.sg/team/ngo-wei-lin/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/ngo-wei-lin/</guid>
      <description></description>
    </item>
    <item>
      <title>Nguyễn Đăng Nguyễn</title>
      <link>https://starlabs.sg/team/nguy%E1%BB%85n-%C4%91%C4%83ng-nguy%E1%BB%85n/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/nguy%E1%BB%85n-%C4%91%C4%83ng-nguy%E1%BB%85n/</guid>
      <description></description>
    </item>
    <item>
      <title>Nguyễn Hoàng Thạch</title>
      <link>https://starlabs.sg/team/nguy%E1%BB%85n-ho%C3%A0ng-th%E1%BA%A1ch/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/nguy%E1%BB%85n-ho%C3%A0ng-th%E1%BA%A1ch/</guid>
      <description></description>
    </item>
    <item>
      <title>Nguyễn Tiền Giang</title>
      <link>https://starlabs.sg/team/nguy%E1%BB%85n-ti%E1%BB%81n-giang/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/nguy%E1%BB%85n-ti%E1%BB%81n-giang/</guid>
      <description></description>
    </item>
    <item>
      <title>Pan Zhenpeng</title>
      <link>https://starlabs.sg/team/pan-zhenpeng/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/pan-zhenpeng/</guid>
      <description></description>
    </item>
    <item>
      <title>Peter Nguyễn Vũ Hoàng</title>
      <link>https://starlabs.sg/team/peter-nguy%E1%BB%85n-v%C5%A9-ho%C3%A0ng/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/peter-nguy%E1%BB%85n-v%C5%A9-ho%C3%A0ng/</guid>
      <description></description>
    </item>
    <item>
      <title>Pham Hong Phi</title>
      <link>https://starlabs.sg/team/pham-hong-phi/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/pham-hong-phi/</guid>
      <description></description>
    </item>
    <item>
      <title>Phan Thanh Duy</title>
      <link>https://starlabs.sg/team/phan-thanh-duy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/phan-thanh-duy/</guid>
      <description></description>
    </item>
    <item>
      <title>Poh Jia Hao</title>
      <link>https://starlabs.sg/team/poh-jia-hao/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/poh-jia-hao/</guid>
      <description></description>
    </item>
    <item>
      <title>Sarah Isabel Tan</title>
      <link>https://starlabs.sg/team/sarah-isabel-tan/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/sarah-isabel-tan/</guid>
      <description></description>
    </item>
    <item>
      <title>Search</title>
      <link>https://starlabs.sg/search/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/search/</guid>
      <description></description>
    </item>
    <item>
      <title>Shi Ji</title>
      <link>https://starlabs.sg/team/shi-ji/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/shi-ji/</guid>
      <description></description>
    </item>
    <item>
      <title>Shi Weiming</title>
      <link>https://starlabs.sg/team/shi-weiming/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/shi-weiming/</guid>
      <description></description>
    </item>
    <item>
      <title>Shreyas Penkar</title>
      <link>https://starlabs.sg/team/shreyas-penkar/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/shreyas-penkar/</guid>
      <description></description>
    </item>
    <item>
      <title>Ta Dinh Sung</title>
      <link>https://starlabs.sg/team/ta-dinh-sung/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/ta-dinh-sung/</guid>
      <description></description>
    </item>
    <item>
      <title>Tommy Aung Kaung Htet</title>
      <link>https://starlabs.sg/team/tommy-aung-kaung-htet/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/tommy-aung-kaung-htet/</guid>
      <description></description>
    </item>
    <item>
      <title>Tran Van Khang</title>
      <link>https://starlabs.sg/team/tran-van-khang/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/tran-van-khang/</guid>
      <description></description>
    </item>
    <item>
      <title>Wu Jinlin</title>
      <link>https://starlabs.sg/team/wu-jinlin/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/wu-jinlin/</guid>
      <description></description>
    </item>
    <item>
      <title>Zafir Rasyidi Taufik</title>
      <link>https://starlabs.sg/team/zafir-rasyidi-taufik/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://starlabs.sg/team/zafir-rasyidi-taufik/</guid>
      <description></description>
    </item>
  </channel>
</rss>
