article thumbnail

Cisco Talos discovered 2 critical flaws in the popular OpenCV library

Security Affairs

Maintainers of the OpenCV library addressed two buffer overflow flaws that could lead to arbitrary code execution. Maintainers of the OpenCV library addressed two high-severity buffer overflow vulnerabilities that could be exploited by an attacker to execute arbitrary code. Both vulnerabilities were reported to the vendor in July 2019.

Libraries 243
article thumbnail

Six-Library Vulnerability in NGA

ForAllSecure

The US government has published a software library called six-library designed to parse and manipulate satellite imagery and data for both internal and public use. When examining six-library for potential entry points for fuzzing I kept the following in mind: Look for functions amenable to consuming raw binary data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Six-Library Vulnerability in NGA

ForAllSecure

The US government has published a software library called six-library designed to parse and manipulate satellite imagery and data for both internal and public use. When examining six-library for potential entry points for fuzzing I kept the following in mind: Look for functions amenable to consuming raw binary data.

article thumbnail

How Ursnif Evolves to Keep Threatening Italy

Security Affairs

This means, the content of the variable “$y” actually is a.NET Dynamic Linked Library. In fact, the decryption key is generated starting from the LCID property of the current “ CultureInfo “, data structure providing information about calendar,language and locale in use on the machine. The Powershell Stage.

article thumbnail

Benefits of Enterprise Modeling and Data Intelligence Solutions

erwin

“We use erwin DM to do all of the levels of analysis that a data architect does,” said Sharon A., a senior manager, data governance at an insurance company with over 500 employees. She added, “erwin DM does conceptual, logical and physical database or data structure capture and design, and creates a library of such things.

Metadata 122
article thumbnail

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Security Affairs

OLE files are hierarchical data structures that have several storages and streams (in contrast to folders and files in an operating system). Figure 8 below shows the structure of the xls file. dll library). Figure 27: First stage of RAT builts IAT and load some libraries (kernel32.dll A deeper dive. dll this case).

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

The Sleuth Kit enables administrators to analyze file system data via a library of command-line tools for investing disk images. This includes deep inspection of hundreds of protocols in a standard three-pane packet browser that encapsulates data structures.