Hi there!
I want to share how to compromise whole enterprise network in less than ONE
minute 🙂
Let’s begin… As security consultants, we often advice to our clients to
implement Network Access Control systems to prevent some nasty people to do
their nasty things…
This article is not about how to bypass Network Access Control systems, but
if you’re…
Disclosure timeline
=====================
June 11th: discovered issues.
June 12th: contacted App developer.
June 12th: App developer replies that the new App is not ready yet, but
will not download assets from HTTP.
June 13th: asked how much time it’ll take to fix, App developer didn’t
respond.
July 2nd: App developer queried again, but failed to respond.
July 8th: App developer got his 3rd notice, but failed to respond.
July 9th: full…
the executable installers of Flash Player released 2016-06-15
fixed CVE-2016-1014 in the second attempt, but another vulnerability
remained: they create(d) and use(d) UNSAFE temporary subdirectories
into which they copy/ied themselves and extract(ed) a file “fpb.tmp”
which they load(ed) and execute(d) later with elevated privileges.
An unprivileged user can/could overwrite both files between creation
and execution and gain…