<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Home on Beyond the Security Theater</title>
    <link>https://www.seljan.hu/</link>
    <description>Recent content in Home on Beyond the Security Theater</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Sun, 20 Apr 2025 20:49:00 +0200</lastBuildDate>
    <atom:link href="https://www.seljan.hu/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>About</title>
      <link>https://www.seljan.hu/about/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.seljan.hu/about/</guid>
      <description>&lt;p&gt;&lt;strong&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Security_theater&#34;&gt;Security theater&lt;/a&gt;&lt;/strong&gt; is the practice of investing in countermeasures intended to provide the feeling of improved security while doing little or nothing to achieve it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Contributions</title>
      <link>https://www.seljan.hu/contributions/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.seljan.hu/contributions/</guid>
      <description>&lt;h2 id=&#34;vulnerabilities&#34;&gt;Vulnerabilities&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47984&#34;&gt;CVE-2025-47984&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI Information Disclosure&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388&#34;&gt;CVE-2025-30388&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI+ Remote Code Execution&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.asus.com/content/asus-product-security-advisory/&#34;&gt;CVE-2024-35467&lt;/a&gt;&lt;/strong&gt; - Asus RT-AC87U WPS Denial of Service&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://kb.netgear.com/000066209/Security-Advisory-for-Post-Authentication-Command-Injection-on-the-R8000-PSV-2024-0022&#34;&gt;CVE-2024-39149&lt;/a&gt;&lt;/strong&gt; - NETGEAR R8000 Remote OS Command Injection&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.asus.com/content/asus-product-security-advisory/&#34;&gt;CVE-2024-25464&lt;/a&gt;&lt;/strong&gt; - Asus Download Master Remote OS Command Injection&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerability-in-nas-products-01-30-2024&#34;&gt;CVE-2023-5372&lt;/a&gt;&lt;/strong&gt; - Zyxel NAS Remote Python Code Execution&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-authentication-bypass-and-command-injection-vulnerabilities-in-nas-products&#34;&gt;CVE-2023-4474&lt;/a&gt;&lt;/strong&gt; - Zyxel NAS Remote OS Command Injection&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-authentication-bypass-and-command-injection-vulnerabilities-in-nas-products&#34;&gt;CVE-2023-4473&lt;/a&gt;&lt;/strong&gt; - Zyxel NAS Authentication Bypass&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-authentication-bypass-and-command-injection-vulnerabilities-in-nas-products&#34;&gt;CVE-2023-37928&lt;/a&gt;&lt;/strong&gt; - Zyxel NAS Remote Python Code Execution&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-authentication-bypass-and-command-injection-vulnerabilities-in-nas-products&#34;&gt;CVE-2023-37927&lt;/a&gt;&lt;/strong&gt; - Zyxel NAS Remote OS Command Injection&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38006&#34;&gt;CVE-2022-38006&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI+ Information Disclosure&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35837&#34;&gt;CVE-2022-35837&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI+ Information Disclosure&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34728&#34;&gt;CVE-2022-34728&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI+ Information Disclosure&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29112&#34;&gt;CVE-2022-29112&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI+ Information Disclosure&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26934&#34;&gt;CVE-2022-26934&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI+ Information Disclosure&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21915&#34;&gt;CVE-2022-21915&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI+ Information Disclosure&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21904&#34;&gt;CVE-2022-21904&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI Information Disclosure&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21903&#34;&gt;CVE-2022-21903&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows GDI Elevation of Privilege&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13657&#34;&gt;CVE-2020-13657&lt;/a&gt;&lt;/strong&gt; - Avast Free Antivirus Elevation of Privilege&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1283&#34;&gt;CVE-2020-1283&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows AppInfo Denial of Service&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1123&#34;&gt;CVE-2020-1123&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows DiagTrack Denial of Service&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1076&#34;&gt;CVE-2020-1076&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows VaultSvc Denial of Service&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://web.archive.org/web/20200507151215/https://support.avira.com/hc/en-us/articles/360000142857-Avira-Software-Updater&#34;&gt;CVE-2020-12463&lt;/a&gt;&lt;/strong&gt; - Avira Software Updater Elevation of Privilege&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-0899&#34;&gt;CVE-2020-0899&lt;/a&gt;&lt;/strong&gt; - Microsoft Visual Studio Elevation of Privilege&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-0858&#34;&gt;CVE-2020-0858&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows &amp;ldquo;Account Pictures&amp;rdquo; Elevation of Privilege&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.bitdefender.com/support/security-advisories/untrusted-search-path-vulnerability-bitdefender-antivirus-free-2020-va-8422/&#34;&gt;CVE-2020-8094&lt;/a&gt;&lt;/strong&gt; - Bitdefender Antivirus Free 2020 Elevation of Privilege&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1476&#34;&gt;CVE-2019-1476&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows AppXSvc Elevation of Privilege&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1253&#34;&gt;CVE-2019-1253&lt;/a&gt;&lt;/strong&gt; - Microsoft Windows AppXSvc Elevation of Privilege&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/33713&#34;&gt;CVE-2014-4643&lt;/a&gt;&lt;/strong&gt; - Core FTP LE Remote Code Execution&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.kb.cert.org/vuls/id/698278/&#34;&gt;CVE-2013-7260&lt;/a&gt;&lt;/strong&gt; - RealPlayer Remote Code Execution&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;exploits&#34;&gt;&lt;a href=&#34;https://www.exploit-db.com/?author=6711&#34;&gt;Exploits&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/47768&#34;&gt;AppXSvc 17763 - Arbitrary File Overwrite (DoS)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/47389&#34;&gt;AppXSvc - Privilege Escalation&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/37056&#34;&gt;BulletProof FTP Client 2010 - Local Buffer Overflow (DEP Bypass)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/34162&#34;&gt;BulletProof FTP Client 2010 - Buffer Overflow (SEH) (PoC)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/33713&#34;&gt;Core FTP LE 2.2 - Heap Overflow (PoC)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/32514&#34;&gt;Haihaisoft Universal Player 1.5.8 - &amp;lsquo;.m3u&amp;rsquo; / &amp;lsquo;.pls &amp;lsquo;/ &amp;lsquo;.asx&amp;rsquo; Buffer Overflow (SEH)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/32513&#34;&gt;Haihaisoft HUPlayer 1.0.4.8 - &amp;lsquo;.m3u&amp;rsquo; / &amp;lsquo;.pls&amp;rsquo; / &amp;lsquo;.asx&amp;rsquo; Buffer Overflow (SEH)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/32041&#34;&gt;ALLPlayer 5.8.1 - &amp;lsquo;.m3u&amp;rsquo; Local Buffer Overflow (SEH)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/31914&#34;&gt;Gold MP4 Player 3.3 - Buffer Overflow (PoC) (SEH)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/31913&#34;&gt;Music AlarmClock 2.1.0 - &amp;lsquo;.m3u&amp;rsquo; Crash (PoC)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.exploit-db.com/exploits/30468&#34;&gt;RealPlayer 16.0.3.51/16.0.2.32 - &amp;lsquo;.rmp&amp;rsquo; Version Attribute Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;metasploit-modules&#34;&gt;Metasploit modules&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/browser/malwarebytes_update_exec&#34;&gt;Malwarebytes Anti-Malware and Anti-Exploit Update Remote Code Execution&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/http/diskboss_get_bof&#34;&gt;DiskBoss Enterprise GET Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/http/disksavvy_get_bof&#34;&gt;DiskSavvy Enterprise GET Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/fileformat/iftp_schedule_bof&#34;&gt;i-FTP Schedule Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/browser/getgodm_http_response_bof&#34;&gt;GetGo Download Manager HTTP Response Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/fileformat/mplayer_m3u_bof&#34;&gt;MPlayer Lite M3U Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/fileformat/bpftp_client_bps_bof&#34;&gt;BulletProof FTP Client BPS Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/fileformat/allplayer_m3u_bof&#34;&gt;ALLPlayer M3U Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/fileformat/easycdda_pls_bof&#34;&gt;Easy CD-DA Recorder PLS Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/db/modules/exploit/windows/fileformat/realplayer_ver_attribute_bof&#34;&gt;RealNetworks RealPlayer Version Attribute Buffer Overflow&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Authentication bypass and multiple injection vulnerabilities in Zyxel&#39;s NAS devices</title>
      <link>https://www.seljan.hu/posts/authentication-bypass-and-multiple-injection-vulnerabilities-in-zyxels-nas-devices/</link>
      <pubDate>Sun, 20 Apr 2025 11:36:14 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/authentication-bypass-and-multiple-injection-vulnerabilities-in-zyxels-nas-devices/</guid>
      <description>An authentication bypass vulnerability exists in the web management interface of certain Zyxel NAS devices. This flaw allows unauthenticated attackers to remotely perform unauthorized actions on affected systems. Additionally, multiple post-authentication code and command injection vulnerabilities may arise when the devices improperly process user-supplied input. These vulnerabilities enable attackers to execute arbitrary code or commands remotely on impacted devices.</description>
    </item>
    <item>
      <title>Out-of-bounds read information disclosure vulnerability in Microsoft Windows GDI&#43; EMR_STRETCHDIBITS record (again)</title>
      <link>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_stretchdibits-record-again/</link>
      <pubDate>Sat, 28 May 2022 11:14:00 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_stretchdibits-record-again/</guid>
      <description>An information disclosure vulnerability (CVE-2022-38006) exists when the Windows GDI+ component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user&amp;rsquo;s system.</description>
    </item>
    <item>
      <title>Out-of-bounds read information disclosure vulnerability in Microsoft Windows GDI&#43; EMR_SETPIXELV record</title>
      <link>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_setpixelv-record/</link>
      <pubDate>Fri, 20 May 2022 10:41:00 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_setpixelv-record/</guid>
      <description>An information disclosure vulnerability (CVE-2022-34728) exists when the Windows GDI+ component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user&amp;rsquo;s system.</description>
    </item>
    <item>
      <title>Arbitrary read information disclosure vulnerability in Microsoft Windows GDI&#43; EMR_STARTDOC record</title>
      <link>https://www.seljan.hu/posts/arbitrary-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_startdoc-record/</link>
      <pubDate>Mon, 16 May 2022 01:47:00 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_startdoc-record/</guid>
      <description>An information disclosure vulnerability (CVE-2022-35837) exists when the Windows GDI+ component improperly discloses memory information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user&amp;rsquo;s system.</description>
    </item>
    <item>
      <title>Out-of-bounds read information disclosure vulnerability in Microsoft Windows GDI&#43; EMR_CREATEDIBPATTERNBRUSHPT record</title>
      <link>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_createdibpatternbrushpt-record/</link>
      <pubDate>Wed, 29 Dec 2021 00:18:14 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_createdibpatternbrushpt-record/</guid>
      <description>An information disclosure vulnerability (CVE-2022-26934) exists when the Windows GDI+ component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user&amp;rsquo;s system.</description>
    </item>
    <item>
      <title>Out-of-bounds read information disclosure vulnerability in Microsoft Windows GDI&#43; EMR_BITBLT record</title>
      <link>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_bitblt-record/</link>
      <pubDate>Fri, 26 Nov 2021 11:36:14 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_bitblt-record/</guid>
      <description>An information disclosure vulnerability (CVE-2022-29112) exists when the Windows GDI+ component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user&amp;rsquo;s system.</description>
    </item>
    <item>
      <title>Out-of-bounds read information disclosure vulnerability in Microsoft Windows GDI&#43; EMR_STRETCHDIBITS record</title>
      <link>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_stretchdibits-record/</link>
      <pubDate>Wed, 29 Sep 2021 16:00:14 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_stretchdibits-record/</guid>
      <description>An information disclosure vulnerability (CVE-2022-21915) exists when the Windows GDI+ component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user&amp;rsquo;s system.</description>
    </item>
    <item>
      <title>Out-of-bounds read information disclosure vulnerability in Microsoft Windows GDI&#43; EMR_SETDIBITSTODEVICE record</title>
      <link>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_setdibitstodevice-record/</link>
      <pubDate>Thu, 09 Sep 2021 20:51:00 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/out-of-bounds-read-information-disclosure-vulnerability-in-microsoft-windows-gdi-emr_setdibitstodevice-record/</guid>
      <description>An information disclosure vulnerability (CVE-2022-21904) exists when the Windows GDI+ component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user&amp;rsquo;s system.</description>
    </item>
    <item>
      <title>How to mitigate symbolic link attacks on Windows?</title>
      <link>https://www.seljan.hu/posts/how-to-mitigate-symbolic-link-attacks-on-windows/</link>
      <pubDate>Sat, 05 Dec 2020 23:00:14 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/how-to-mitigate-symbolic-link-attacks-on-windows/</guid>
      <description>&lt;h2 id=&#34;tldr&#34;&gt;TL;DR&lt;/h2&gt;&#xA;&lt;p&gt;&lt;code&gt;SymlinkProtect&lt;/code&gt; is a custom minifilter driver for Windows written in C++. It is loaded into the file system driver stack as a filter driver. This allows it to monitor user-mode applications and block malicious attempts to set a reparse point on a directory creating a mount point to some suspicious targets like &lt;code&gt;\RPC Control&lt;/code&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;motivation&#34;&gt;Motivation&lt;/h2&gt;&#xA;&lt;p&gt;Microsoft have recently added hard link mitigation to Windows and they are also actively working on mitigations for other attacks involving file path redirection through junctions or mountpoints. However, in the mean time, symbolic links still present quite a large attack surface. If you are not familiar with the subject, James Forshaw&amp;rsquo;s (&lt;a href=&#34;https://twitter.com/tiraniddo&#34;&gt;@tiraniddo&lt;/a&gt;) &lt;a href=&#34;https://www.tiraniddo.dev&#34;&gt;blog&lt;/a&gt;, &lt;a href=&#34;https://www.youtube.com/watch?v=0KO3oGXtMNo&#34;&gt;presentation&lt;/a&gt; and &lt;a href=&#34;https://github.com/googleprojectzero/symboliclink-testing-tools&#34;&gt;tools&lt;/a&gt; are the go-to resources.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NULL pointer dereference in Windows GDI bParseWin32MetaFile</title>
      <link>https://www.seljan.hu/posts/null-pointer-dereference-in-windows-gdi-bparsewin32metafile/</link>
      <pubDate>Thu, 23 Jul 2020 16:00:14 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/null-pointer-dereference-in-windows-gdi-bparsewin32metafile/</guid>
      <description>&lt;h2 id=&#34;tldr&#34;&gt;TL;DR&lt;/h2&gt;&#xA;&lt;p&gt;A denial of service vulnerability exists when Windows GDI improperly handles objects in memory. Converting a specially crafted &lt;code&gt;EMF&lt;/code&gt; file to a &lt;code&gt;WMF&lt;/code&gt; may trigger a read access violation due to a &lt;code&gt;NULL&lt;/code&gt; pointer dereference and could allow denial of service.&lt;/p&gt;&#xA;&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;&#xA;&lt;p&gt;It seems that calling &lt;code&gt;Metafile::EmfToWmfBits()&lt;/code&gt; method on a specially crafted &lt;code&gt;EMF&lt;/code&gt; file may lead to memory corruption triggered by &lt;code&gt;bGetNextRecord()&lt;/code&gt; called by the &lt;code&gt;bParseWin32Metafile()&lt;/code&gt; function. The below is the relevant excerpt of the crash analysis from &lt;code&gt;WinDbg&lt;/code&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Write access violation in Windows GDI DocumentEvent</title>
      <link>https://www.seljan.hu/posts/write-access-violation-in-windows-gdi-documentevent/</link>
      <pubDate>Sun, 19 Jul 2020 16:00:14 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/write-access-violation-in-windows-gdi-documentevent/</guid>
      <description>&lt;h2 id=&#34;tldr&#34;&gt;TL;DR&lt;/h2&gt;&#xA;&lt;p&gt;A denial of service vulnerability exists when Windows GDI improperly handles objects in memory. Processing a specially crafted picture may trigger a write access violation exception when the &lt;em&gt;device context&lt;/em&gt; is associated with a printer.&lt;/p&gt;&#xA;&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;&#xA;&lt;p&gt;While looking into old vulnerabilities related to GDI+ I have encountered a write access violation similar to CVE-2016-0169 and CVE-2016-0170. Calling &lt;code&gt;PlayEnhMetaFile()&lt;/code&gt; with a printer device and a specially crafted &lt;code&gt;EMF&lt;/code&gt; file may lead to memory corruption triggered by the &lt;code&gt;PROXYPORT::DocumentEvent()&lt;/code&gt; function. The below is the relevant excerpt of the crash analysis from &lt;code&gt;WinDbg&lt;/code&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Arbitrary directory creation in AppInfo</title>
      <link>https://www.seljan.hu/posts/arbitrary-directory-creation-in-appinfo/</link>
      <pubDate>Fri, 03 Apr 2020 11:54:51 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-directory-creation-in-appinfo/</guid>
      <description>A denial of service (CVE-2020-1283) vulnerability exists when the Application Information (AppInfo) service improperly handles symbolic links resulting in a low privileged user being able to create arbitrary directories.</description>
    </item>
    <item>
      <title>Arbitrary directory creation in DiagTrack</title>
      <link>https://www.seljan.hu/posts/arbitrary-directory-creation-in-diagtrack/</link>
      <pubDate>Sun, 22 Mar 2020 11:54:51 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-directory-creation-in-diagtrack/</guid>
      <description>A denial of service (CVE-2020-1123) vulnerability exists when the Connected User Experiences and Telemetry (DiagTrack) service improperly handles symbolic links resulting in a low privileged user being able to create arbitrary directories.</description>
    </item>
    <item>
      <title>Untrusted search path in Windows Phone Task Scheduler</title>
      <link>https://www.seljan.hu/posts/untrusted-search-path-in-windows-phone-task-scheduler/</link>
      <pubDate>Sun, 08 Mar 2020 20:52:18 +0100</pubDate>
      <guid>https://www.seljan.hu/posts/untrusted-search-path-in-windows-phone-task-scheduler/</guid>
      <description>An elevation of privilege vulnerability exists when the Windows Phone Task Scheduler (WPTaskScheduler) improperly handles loading of DLL files potentially allowing low privileged users to execute arbitrary code in the context of the local SYSTEM account.</description>
    </item>
    <item>
      <title>Arbitrary file write in Visual Studio Updater Service</title>
      <link>https://www.seljan.hu/posts/arbitrary-file-write-in-visual-studio-updater-service/</link>
      <pubDate>Wed, 05 Feb 2020 22:20:51 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-file-write-in-visual-studio-updater-service/</guid>
      <description>An elevation of privilege vulnerability (CVE-2020-0899) exists when the Visual Studio Update Service improperly handles file hard links and path redirection through junctions or mount points resulting in low privileged users being able to write arbitrary files.</description>
    </item>
    <item>
      <title>Arbitrary file write in VaultSvc</title>
      <link>https://www.seljan.hu/posts/arbitrary-file-write-in-vaultsvc/</link>
      <pubDate>Sun, 02 Feb 2020 22:27:51 +0100</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-file-write-in-vaultsvc/</guid>
      <description>A denial of service vulnerability (CVE-2020-1076) exists when the Credential Manager (VaultSvc) improperly handles symbolic links resulting in a low privileged user being able to write arbitrary files.</description>
    </item>
    <item>
      <title>Arbitrary file security descriptor overwrite in Avira Software Updater</title>
      <link>https://www.seljan.hu/posts/arbitrary-file-security-descriptor-overwrite-in-avira-software-updater/</link>
      <pubDate>Wed, 29 Jan 2020 18:20:46 +0100</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-file-security-descriptor-overwrite-in-avira-software-updater/</guid>
      <description>An elevation of privilege vulnerability (CVE-2020-12463) exists in Avira Software Updater due to improperly handling file hard links, resulting in a low privileged user being able to take control of an arbitrary file.</description>
    </item>
    <item>
      <title>PATH directories DLL planting on default Windows installations</title>
      <link>https://www.seljan.hu/posts/path-directories-dll-planting-on-default-windows-installations/</link>
      <pubDate>Sat, 25 Jan 2020 12:11:48 +0100</pubDate>
      <guid>https://www.seljan.hu/posts/path-directories-dll-planting-on-default-windows-installations/</guid>
      <description>A user profile folder added to the PATH directories by default is not protected with administrator ACLs, allowing potential PATH directory DLL planting vulnerabilities.</description>
    </item>
    <item>
      <title>Arbitrary file security descriptor overwrite in Avast Free Antivirus</title>
      <link>https://www.seljan.hu/posts/arbitrary-file-security-descriptor-overwrite-in-avast-free-antivirus/</link>
      <pubDate>Wed, 22 Jan 2020 19:12:04 +0100</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-file-security-descriptor-overwrite-in-avast-free-antivirus/</guid>
      <description>An elevation of privilege vulnerability (CVE-2020-13657) exists in Avast Free Antivirus due to improperly handling file hard links, resulting in a low privileged user being able to obtain write access to an arbitrary file.</description>
    </item>
    <item>
      <title>DLL planting in Bitdefender Antivirus Free 2020</title>
      <link>https://www.seljan.hu/posts/dll-planting-in-bitdefender-antivirus-free-2020/</link>
      <pubDate>Sat, 18 Jan 2020 20:43:04 +0100</pubDate>
      <guid>https://www.seljan.hu/posts/dll-planting-in-bitdefender-antivirus-free-2020/</guid>
      <description>An elevation of privilege vulnerability (CVE-2020-8094) exists in Bitdefender Antivirus Free 2020 due to DLL planting, resulting in low privileged users being able to execute code as SYSTEM via a specially crafted DLL file.</description>
    </item>
    <item>
      <title>Explorer does not enforce the same-origin policy on local files</title>
      <link>https://www.seljan.hu/posts/explorer-does-not-enforce-the-same-origin-policy-on-local-files/</link>
      <pubDate>Sun, 15 Dec 2019 21:45:21 +0100</pubDate>
      <guid>https://www.seljan.hu/posts/explorer-does-not-enforce-the-same-origin-policy-on-local-files/</guid>
      <description>By default, Internet Explorer does not enforce the same-origin policy on files in the Local Machine Zone resulting in local files being able to send arbitrary cross-domain requests without preflight and read the response.</description>
    </item>
    <item>
      <title>Arbitrary file overwrite in AppXSvc</title>
      <link>https://www.seljan.hu/posts/arbitrary-file-overwrite-in-appxsvc/</link>
      <pubDate>Tue, 10 Dec 2019 11:54:51 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-file-overwrite-in-appxsvc/</guid>
      <description>An elevation of privilege vulnerability (CVE-2019-1476) exists when the AppX Deployment Server (AppXSvc) improperly handles file hard links resulting in a low privileged user being able to overwrite an arbitrary file.</description>
    </item>
    <item>
      <title>Arbitrary file security descriptor overwrite in AppXSvc</title>
      <link>https://www.seljan.hu/posts/arbitrary-file-security-descriptor-overwrite-in-appxsvc/</link>
      <pubDate>Sun, 15 Sep 2019 20:50:51 +0200</pubDate>
      <guid>https://www.seljan.hu/posts/arbitrary-file-security-descriptor-overwrite-in-appxsvc/</guid>
      <description>An elevation of privilege vulnerability (CVE-2019-1253) exists when the AppX Deployment Server (AppXSvc) improperly handles file hard links resulting in a low privileged user being able to take Full Control of an arbitrary file.</description>
    </item>
    <item>
      <title>Search</title>
      <link>https://www.seljan.hu/search/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.seljan.hu/search/</guid>
      <description></description>
    </item>
  </channel>
</rss>
