ENSILO BLOG

You are Reading:  

Open Door: Unix Open Source Vulnerabilities Affect Mac OS X

Today, Apple’s MacOS X 10.12.4 update includes security fixes for several open source vulnerabilities. The update includes a vulnerability fix that enSilo’s researcher, Omer Medan, disclosed to...

Read More

Command Injection/Elevation – Environment Variables Revisited

Windows environment variables can be used to run commands and can also be used to bypass UAC, allowing an attacker with limited privileges to take complete control of the system. This code...

Read More

Elastic Boundaries – Elevating privileges by environment variables expansion

Even though any process is provided with variables from its environment, they are often overlooked by users, developers and sometimes even the OS itself.

Read More

Captain Hook: Pirating AVs to Bypass Exploit Mitigations

TL;DR: We found 6(!) different common security issues that stem from incorrect implementation of code hooking and injection techniques. These issues were found in more than 15 different products....

Read More

Sedating the Watchdog: Abusing Security Products to Bypass Mitigations

TL;DR: Design issues in various security products, such as anti-virus, make it significantly easier for threat actors to bypass exploit mitigations. As part of our ongoing goal of complete...

Read More

Class Dismissed: 4 Use-After-Free Vulnerabilities in Windows

Introduction

Today, Microsoft released their latest Patch Tuesday. This Patch includes a fix for CVE-2015-2363, a complementary patch to CVE-2015-2360 from last month. The two CVEs together...

Read More

Vulnerability Patching: Learning from AVG on Doing it Right.

Introduction

As part of our research, we analyze the intricate relationship between Anti-Virus and Operating Systems (OS). During this process, we came across a vulnerability in AVG Internet...

Read More

SANS review of ensilo

CATEGORIES

FEATURED ARTICLES

tag cloud