Harry Sintonen
Infosec consultant at REVƎЯSEC https://reversec.com/ - Coding, Research + various other interests
- 28 Posts
- 21 Comments
Harry Sintonen@infosec.exchangeOPtoProgramming@fedia.io•I just spent untold hours debugging an issue I introduced myself by "removing an unnecessary variable".1·vor 2 Monaten@Alexstarfire@lemmy.world I sure did. I also renamed the variable to a name that makes its existence obvious to anyone reading the code.
Harry Sintonen@infosec.exchangeOPtoProgramming@fedia.io•I just spent untold hours debugging an issue I introduced myself by "removing an unnecessary variable".1·vor 2 MonatenThe code originally made a copy of a struct before modifying the copy. The original was then used afterwards. I entirely missed the later use and that it was critical that the original struct was used as is. So I passed a subtly modified struct to the later processing, which, in combination with a second bug I had introduced some time earlier, caused all kinds of havoc.
There was another bug I also introduced, which funnily had similar effects. This bug was added months ago, and it affected only older OS versions. I typically only run the bleeding version during development (but I had tested the change with older versions, too). Unfortunately, this issue was random as it depended on stack contents to get triggered, and thus went unnoticed until the additional scrutiny introduced this intense debugging session.
The combination of these factors made this highly frustrating thing to debug, as any kind of A-B testing fails when you have multiple or random issues.
#bugstories
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•The fallout from the malicious tj-actions/changed-files is still being investigated. It is fortuitous that this malicious commit was identified fairly quickly, as further compromise of major OSS2·vor 4 Monaten@jerry It largely depends on how well the initial impact is cleaned up. I’m hoping we won’t see a ton of backdoors in various components next.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#curl predecessor httpget 0.2 from around 1996/1997 is 165 lines. Needless to say, it has multiple critical security vulnerabilities. How many can you spot?1·vor 5 MonatenThe httpget 0.2 doesn’t quite work in the form it was uploaded.
First it uses hardcoded argv, argc instead of getting from the app invocation (as args in main, the code uses void main).
Second obtaining any data from the socket will result in the app stopping and leaving behind an empty file (if (nread) break;).
This program could never download anything. It is likely some work in progress or modified test version of httpget. Since it includes some windows specific headers and has disabled the unix ones I can only presume it was some earlier attempt to get the tool running on windows.
So while the code has a local stack buffer overflow it can’t be triggered for this early version.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•As expected #Apple has nuked Advanced Data Protection (ADP) for UK users. What does this mean in practice? UK govt will be able to decrypt all UK user's #iCloud data at will.1·vor 5 MonatenIf this trend continues, we will be losing the ability to use secure means of communication with UK friends and colleagues. For example, #signalapp will rather get out of the UK than add backdoors: https://www.bbc.com/news/technology-64584001
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#Nordnet - nordic digital platform for savings and investments - had an issue where people could see each others information. The website has been taken down for now.1·vor 5 Monaten“#Nordnet admits that it was possible to trade in other people’s depots during the IT breakdown”
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#Nordnet - nordic digital platform for savings and investments - had an issue where people could see each others information. The website has been taken down for now.1·vor 5 Monaten#Nordnet services appear to be back.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#Nordnet - nordic digital platform for savings and investments - had an issue where people could see each others information. The website has been taken down for now.1·vor 5 MonatenNordnet has a lot of technical issues to sort out. If the malfunction allowed unauthorized parties to operate the accounts it will be quite messy to sort out.
Among with technical part, they will have to deal with the regulatory issues, in particular the Financial Supervisory Authority. They will demand answers.
Harry Sintonen@infosec.exchangeOPtoProgramming@fedia.io•In my youth I wrote m68k assembly programs with tens of thousands of lines and speed optimized every section of the code, even initialization/cleanup executed exactly once. It was very very silly. It1·vor 5 MonatenI still occasionally write some m68k code and apps. These are from 2024:
- Execute code in #amiga color registers: https://sintonen.fi/src/colexec/colexec.asm
- RXS-M-XS 32bit->32bit Permuted Congruential Generator: https://sintonen.fi/src/misc/pcg/_rand.asm
- Minimal modplayer (protracker music player): https://sintonen.fi/src/minimod/ (the replayer routine is mostly from Frank Wille however)
Harry Sintonen@infosec.exchangeOPtoProgramming@fedia.io•In my youth I wrote m68k assembly programs with tens of thousands of lines and speed optimized every section of the code, even initialization/cleanup executed exactly once. It was very very silly. It1·vor 5 MonatenI also participated in very useless size/speedcoding competitions - some of them are still accessible from this old web page: https://amycoders.org/compo/
Note that some of the HTML is a bit broken, for example https://amycoders.org/compo/circlecompo.html - you can view source to see the full routine
#m68k #assembly #sizecoding #speedcoding
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#cURL doesn't validate SSH host identity if known_hosts file is missing. I think this is a #vulnerability, but the project disagrees. Advisory is here:2·vor 5 Monaten@SatyrSack@feddit.org Curl will likely address this eventually even though they don’t consider it a vulnerability. See https://github.com/curl/curl/issues/16197
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•#cURL doesn't validate SSH host identity if known_hosts file is missing. I think this is a #vulnerability, but the project disagrees. Advisory is here:3·vor 5 MonatenThe latest curl version 8.12.0 (released today) is affected.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently there's a major #vulnerability in #AMD CPUs: "AMD Microcode Signature Verification Vulnerability."1·vor 5 MonatenThe details of the #AMD Microcode Signature Verification #Vulnerability are out:
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
- https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w
#infosec #infosecurity #cybersecurity
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently there's a major #vulnerability in #AMD CPUs: "AMD Microcode Signature Verification Vulnerability."3·vor 6 MonatenSo what could you do if the microcode signature verification can be bypassed? While not directly applicable, this #defcon presentation “DEF CON 31 - Backdoor in the Core - Altering Intel x86 Instruction Set at Runtime - Krog, Skovsende” gives some ideas: https://www.youtube.com/watch?v=Zda7yMbbW7s
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently there's a major #vulnerability in #AMD CPUs: "AMD Microcode Signature Verification Vulnerability."2·vor 6 Monaten@gabrielesvelto Yeah, information for that vulnerability is non-existent as well. In all the vulnerability management doesn’t seem to be going great here.
Update: The “PeCoffLoader memory overflow issue for security” likely is CVE-2024-38796: https://nvd.nist.gov/vuln/detail/cve-2024-38796
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently #macOS now considers #Docker malware.5·vor 6 MonatenI had actually forgotten I still had Docker installed on this system. I’ve now fixed this issue by uninstalling the malicious app. I’m using #podman elsewhere already, just had this install lingering still. Apple: Thanks for the warning!
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•Apparently #macOS now considers #Docker malware.4·vor 6 Monaten@g@irrelephant.co Oof, that’s not good at all.
Harry Sintonen@infosec.exchangeOPtoCybersecurity@fedia.io•In January 2022 I discovered that #Microsoft #Office365 Message #Encryption (OME) utilized Electronic Codebook (ECB) mode of operation. I reported this, got paid a $5000 bounty and then things fell1·vor 7 Monaten@screaminggoat@infosec.exchange Yep, that’s the one.
Harry Sintonen@infosec.exchangeOPtoProgramming@fedia.io•I love the introductory chapter in the Bendix G15 Programmers's Reference Manual - when computers were still fresh enough that you had to start from the very basic concepts.1·vor 8 Monaten@jgrg Oops, it’s u-z. Corrected the post now, thanks for pointing that out.
Here’s the more constructive part of the (I still think warranted - but likely a bit tone deaf) rant: https://github.com/tukaani-project/xz/pull/181