Questions tagged [zero-day]

A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability.

105 questions
2
votes
2 answers

Security Practices by Employees in a Corporate Environment

Consider the following situation : 1. Somehow my boss's system got infected with a malware ( He visited one of the Java exploits website). 2. He sends a PDF document containing the requirement document of a new project coming up ( the malware…
Novice User
  • 2,088
  • 7
  • 26
  • 38
2
votes
1 answer

How disable Java in Chrome 23?

Well in case someone doesn't know yet... there is a new Java zero day. I'm trying to disable it on Chrome but I can't find any option. Google searches says that the option for deactivate it is on chrome://plugins however I don't see such option…
The Illusive Man
  • 10,487
  • 16
  • 56
  • 88
2
votes
1 answer

Blocking outbound connections to mitigate CVE-2021-44228 log4j?

As I understand it, a successful exploit requires a connection to an external server to download a payload. If a device can't be patched or otherwise mitigated, does restricting its outbound access prevent a successful exploit? Assuming this is an…
poke
  • 365
  • 1
  • 3
  • 11
2
votes
4 answers

Virus won't be picked up by Antivirus tools

Today we found a virus / trojan on our network which has thus far: Hidden all files and folders Replaced the hidden files and folders with executables of itself, with matching icons, and renamed itself to those files. Kaspersky picks it up, and is…
BOMEz
  • 123
  • 5
2
votes
3 answers

Can I tell which applications embed Internet Explorer at a command prompt?

A recently discovered vulnerability affects Internet Explorer versions up to version 9, running on Windows XP, Vista, and Windows 7. This arstechnica article quotes HD Moore as saying, Just keep in mind that even if you don't use IE for day-to-day …
2
votes
2 answers

What approaches are used to discover zero-day vulnerabilities?

As a developer of multiple standalone apps (Web-/Native apps) I am wondering, what things I should keep in mind / what are typical approaches of a blackhat (besides of these scriptkiddies checking for sql injection etc.) to identify such…
0x2E5
  • 21
  • 1
2
votes
1 answer

How does malware such as Stuxnet and Flamer propagate through USB memory sticks?

The best explanation I found is from this article but it still is unclear to me. Apparently a new vulnerability has been found involving .lnk files where when a folder on the memory stick containing the .lnk file is viewed any file on the stick can…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
2
votes
2 answers

Is CVE-2017-5428 (mfsa2017-08) a zero-day?

CVE-2017-5428 aka MFSA-2017-08 is an integer overflow vulnerability in Mozilla Firefox. It was reported through the Pwn2Own contest, and corrected in Firefox 52.0.1. This article describes it as a zero-day vulnerability, but I thought Pwn2Own used…
Harry Johnston
  • 1,667
  • 10
  • 14
2
votes
1 answer

How to justify a Vulnerability Research function at a company

From a business standpoint, how would you express the need for a vulnerability research team? In the end, would it be infeasible from a business standpoint unless said business chalked it up as a marketing cost (to promote other services) or sold…
1
vote
1 answer

Clarification about the post: Russian hackers use ‘zero-day’ to hack NATO, Ukraine in cyber-spy campaign

I have encountered the following article on Washington post: Russian hackers use ‘zero-day’ to hack NATO, Ukraine in cyber-spy campaign. As always in such kind of articles the publication sounds too scary. There is almost no information to…
Salvador Dali
  • 1,745
  • 1
  • 19
  • 32
1
vote
0 answers

What is known about recent zero day flaw with Tails up to this point in time and is Tails able to keep us anonymous from a global adversary?

Following is a excerpt from COMPUTERWORLD Yesterday, in talking about the zero-day vulnerability in Tails, Exodus Intelligence wrote: "We publicized the fact that we’ve discovered these issues for a very simple reason: no user should put…
Roya
  • 129
  • 7
1
vote
1 answer

Are updated iOS devices vulnerable to NSO Pegasus?

The Trident memory zero-day, zero-click vulnerabilities (exploits critical to NSO Pegasus success) were supposedly patched on iOS by Apple: CVE-2016-4657 CVE-2016-4655 CVE-2016-4656 Android phones are presumably still vulnerable. And since 1000s…
hobs
  • 161
  • 6
1
vote
1 answer

How likely are Evince, XReader or Adobe Reader with scripts disabled, to be exploited by a malicious file?

PDFs are very commonly found on the web, and I carefully either view them on the browsers, or use readers without the capability to run the scripts that may come with them (shitty design choice) like Evince or XReader, or, on Windows, disable the…
memememe
  • 121
  • 1
1
vote
1 answer

Does every modern buffer overflow require multiple exploits in end user devices to be utilized?

On modern user oriented devices, such as Android phones, iPhones, PCs(Windows, MacOS, Linux), if there is a remote buffer overflow 0 day, are they only exploitable with the aid of multiple vulnerabilities? An example of this is the need to bypass…
john doe
  • 648
  • 4
  • 15
1
vote
0 answers

Is this 0-day RCE Exploit for Chrome fake?

I found this guy claiming that he has a 0-day Exploit for Chrome, Firefox and Windows 10, but to me it seems to be fake... Video - 0day RCE Exploit for Google Chrome 59.0.3071.86 Here is video for newer version of Chrome…
user134969
  • 1,298
  • 4
  • 15
  • 24