Questions tagged [zero-day]

A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability.

105 questions
12
votes
1 answer

Why is EC2 not vulnerable to VENOM?

I saw the advisory stating that EC2 instances are not vulnerable to VENOM. My understanding is that EC2 runs on Xen, and that VENOM affects XEN. Can anyone explain why EC2 is not vulnerable? Do they remove the floppy drive emulation? Or did they…
pkaeding
  • 1,024
  • 7
  • 12
12
votes
3 answers

How do you defend specifically against attackers utilizing any or all of the commercial exploit kits?

There are several commercial exploit kits available containing 0day vulnerabilities: White Phosphorus Exploit Pack http://www.immunityinc.com/products-whitephosphorus.shtml Agora Exploit Pack http://gleg.net/agora.shtml VulnDisco Exploit Pack…
Tate Hansen
  • 13,714
  • 3
  • 40
  • 83
11
votes
5 answers

What are the areas to focus on to protect users and devices?

What are the areas or technologies to focus on to protect users and devices? Are patching, antivirus and firewalls still the main areas? How do you defend against attacks against vulnerabilities that have no patch?
Sim
  • 1,227
  • 1
  • 13
  • 21
11
votes
1 answer

Does today's Shadowbrokers leak affect the average Windows user?

Today (on April 14) the self-called "ShadowBrokers" released a large dump of ready-to-use 0-day exploits, partly with detailed usage explanations. Now I understand that this is really bad for companies that have internet-facing Windows Servers or…
SEJPM
  • 9,500
  • 5
  • 35
  • 66
10
votes
2 answers

Encouraging security researchers to disclose vulnerabilities

What are approaches to forming solid relationships with security researchers? For example, is publishing a public PGP key on the "contact us" page of a company's website for high levels of risk related to security standard practice?
blunders
  • 5,052
  • 4
  • 28
  • 45
10
votes
1 answer

Heartbleed how to find out applications using statically compiled version of openssl?

We're analysing issue at work and I wondering how to find out if there's any binary with a statically compiled version of openssl which includes this bug. Would it be possible to find a fingerprint from the code which contains the bug?
Augusto
  • 398
  • 1
  • 11
10
votes
6 answers

What is zero day?

More specifically, if a website is using an application already known to have a flaw as part of the larger service it offers (so, say it's using a version of Apache known to have a flaw, and the continued presence of that flaw has been confirmed by…
root
  • 1,547
  • 3
  • 12
  • 20
10
votes
2 answers

What are the likely effects of increased government spending on "Cyber Weapons" on the software industry?

From the conference scene and news this year it seems probable that there's an increased amount of spending from governmental agencies on what it getting termed "Cyber Weapons". A key component of these weapons are 0-day vulnerabilities which can…
Rory McCune
  • 60,923
  • 14
  • 136
  • 217
9
votes
6 answers

A new programming paradigm (e.g., Rust) to reduce or end all zero-day vulnerabilities/exploits?

In view of the Hafnium and Solarwind hacks, where multiple zero-day vulnerabilities were used to ultimately stage the hack and data exfiltration, would the use of memory safe programming languages such as Rust to build software help to reduce or end…
Nathan Aw
  • 1
  • 7
  • 12
9
votes
2 answers

How do I protect myself from Pegasus and alike malwares?

I recently came across reports in media that Whatsapp's services were exploited by a malware Pegasus for illegal surveillance of certain individuals. Pegasus, which exploits 0-day vulnerabilities, is known to infect a device just by visiting a…
Firelord
  • 220
  • 1
  • 9
8
votes
2 answers

How to keep using Java 6 securely, despite its unpatch vulnerabilities

Given that Java 6 is now deprecated by Oracle and there recently has been notification of a 0day (that will exist forever now that Oracle is not patching JRE6), what can we do to prevent drive-by exploitation of Java within our browsers? We cannot…
fixulate
  • 788
  • 4
  • 9
7
votes
2 answers

How exactly was Sony Pictures hacked November 2014?

There is lots of media coverage like this one but I have not yet been able to find details on how the hackers got into the network, the servers and the users' systems. So what vulnerabilities / zero-days did they use ? How did they apparently manage…
Arc
  • 652
  • 5
  • 11
7
votes
3 answers

How can I detect (or inventory) all DLLs that don't use ASLR?

Based on this IE zero day, I'm interested in listing all DLLs in our systems that have been compiled to not work with ASLR. Ideally, I'd like to analyze a static file and not load it into memory to detect if it's compiled without ASLR…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
7
votes
3 answers

Where can I get security breach alerts?

I've been following a mish-mash of Google News alerts as well as some 'security' influencers on Twitter, but have a feeling there's a more efficient way to deal with this out there...
6
votes
3 answers

find if 0-day flash bug was exploited (on a particular machine)

There have been several critical 0-day exploits in the past days/weeks in Flash alone. Nobody knows how long the 0-days have been exploited, and it is reasonable to expect that there are 0-days being exploited at this moment, but we don't know. The…
Martin Vegter
  • 1,826
  • 4
  • 27
  • 39