/vx/Archive/Defense in depth/

0 directories 84 files
Name Size Modified
Go up
2013-05-19 - Part 1 - The Microsoft Way.txt 1.1 KiB
2013-06-18 - Part 3 - Untitled.txt 15 KiB
2013-07-22 - Part 4 - Untitled.txt 3.8 KiB
2013-07-27 - Part 5 - Stick and persistent vulnerabilities.txt 2.6 KiB
2013-08-07 - Part 6 - Beginners errors, QA sound asleep or out of sight.txt 13 KiB
2013-08-17 - Part 7 - Executable files in data directories.txt 4.6 KiB
2013-08-24 - Part 8 - Executables everywhere.txt 4.6 KiB
2013-08-31 - Part 9 - Erroneous Documentation.txt 4.0 KiB
2013-09-21 - Part 10 - Untitled.txt 11 KiB
2013-10-01 - Part 11 - Privilege escalation for dummies.txt 3.8 KiB
2013-10-19 - Part 12 - NOOP security fixes.txt 3.1 KiB
2013-11-03 - Part 13 - surprising and inconsistent behaviour, sloppy coding, sloppy QA, sloppy documentation .txt 3.3 KiB
2013-11-24 - Part 14 - Incompete, misleading, and dangerous documentation.txt 4.0 KiB
2014-05-28 - Part 15 - Unquoted arguments in 120 of 462 command lines.txt 18 KiB
2014-05-31 - Part 16 - our developers and their QA dont follow our own security recommendations.txt 10 KiB
2014-06-25 - Part 17 - even a one-line script is vulnerable.txt 1.4 KiB
2014-09-02 - Part 18 - Microsoft Office 2010 registers command lines with unquoted pathnames.txt 4.0 KiB
2014-09-06 - Part 19 - Still no perfect forward secrecy per default in Windows.txt 1.7 KiB
2014-11-23 - Part 20 - Microsoft Update may fail to offer current security updates.txt 2.9 KiB
2014-11-23 - Part 21 - errors in consistencies in Windows registry data may lead to buffer overflows or use of random data.txt 6.8 KiB
2014-11-27 - Part 22 - no DEP in Windows' filesystem (and ASLR barely used .txt 3.4 KiB
2014-12-13 - Part 23 - two quotes or not to quote....txt 3.1 KiB
2014-12-21 - Part 24 - applications built with SDKs may be vulnerable.txt 4.8 KiB
2014-12-24 - Part 25 - no secure connections to MSDN, TechNet.txt 3.8 KiB
2014-12-31 - Part 26 - Set Program Access and Computer Defaults .txt 2.7 KiB
2015-01-31 - Part 27 - the command line you get differs from the command line I use to call you .txt 2.9 KiB
2015-02-19 - Part 28 - yes, we can (create even empty, but properly quoted pathnames) .txt 3.7 KiB
2015-02-21 - Part 29 - contradicting, ambiguous, incomplete documentation.txt 6.1 KiB
2015-03-15 - Part 30 - on exploitable Win32 functions .txt 3.7 KiB
2015-03-15 - Part 31 - UAC is for binary planting .txt 2.6 KiB
2015-09-04 - Part 32 - yet another (trivial) UAC bypass resp. privilege escalation.txt 1.4 KiB
2015-09-09 - Part 34 - our developers and our QA still ignore our own security recommendations .txt 724 B
2015-09-11 - Part 33 - arbitrary code execution (and UAC bypass) via RegEdit.exe Part 33 - .txt 5.6 KiB
2015-09-15 - Part 35 - Windows Explorer ignores Run as administrator .txt 2.3 KiB
2015-11-15 - Part 36 - CWE-428 or fun with unquoted paths .txt 7.0 KiB
2015-12-05 - Part 37 - MMC.exe and DrvInst.exe load and execute .dll with elevated resp. SYSTEM privileges .txt 4.0 KiB
2016-01-15 - Part 38 - does Microsoft follow their own security guidance advisories .txt 4.3 KiB
2016-03-15 - Part 39 - vulnerabilities, please meet the bar for security servicing .txt 12 KiB
2016-05-28 - Part 40 - seven plus year old blended threat still alive and kicking .txt 5.2 KiB
2016-06-23 - Part 41 - vulnerable by (poor implementation of bad) design.txt 6.3 KiB
2016-08-11 - Part 42 - Sysinternals utilities load and execute rogue DLLs from TEMP.txt 3.4 KiB
2016-09-06 - Part 43 - restricting the DLL load order fails.txt 4.0 KiB
2016-10-12 - Part 44 - complete failure of Windows Update.txt 3.6 KiB
2016-10-20 - Part 45 - filesystem redirection fails to redirect the application directory.txt 3.7 KiB
2017-03-21 - Part 46 - no checks for common path handling errors in Application Verifier.txt 1.9 KiB
2017-03-21 - Part 47 - AppLocker bypasses are not serviced via monthly security roll-ups.txt 4.5 KiB
2017-07-05 - Part 48 - privilege escalation for dummies -- they didn't make SUCH a stupid blunder .txt 5.4 KiB
2018-01-30 - Part 49 - fun with application manifests.txt 2.4 KiB
2018-02-05 - Part 50 - Windows Update shoves unsafe crap as important updates to unsuspecting users .txt 4.2 KiB
2018-02-09 - Part 51 - Skype's home-grown updater allows escalation of privilege to SYSTEM.txt 2.7 KiB
2018-02-14 - Part 52 - HTTP used to distribute (security) updates, not HTTPS .txt 4.3 KiB
2018-04-09 - Part 53 - our MSRC doesn't know how Windows handles PATH .txt 3.1 KiB
2018-04-09 - Part 54 - escalation of privilege during installation of Microsoft Office 20xy.txt 7.6 KiB
2018-07-17 - Part 55 - new software built with 5.5 year old tool shows 20+ year old vulnerabilities .txt 6.9 KiB
2018-07-17 - Part 55 - new software built with 5.5 year old tool shows over 20 year old vulnerabilities.txt 6.9 KiB
2018-07-18 - Part 56 - 10 plus year old security update installers are susceptiblle to 20 plus year old vulnerability.txt 5.6 KiB
2018-08-14 - Part 57 - all the latest MSVCRT installers allow escalation of privilege.txt 8.7 KiB
2018-09-02 - Part 58 - installation of security updates fails on Windows Embedded POSReady 2009.txt 12 KiB
2019-01-18 - Part 59 - we only fix every other vulnerability.txt 7.4 KiB
2019-01-29 - Part 61 - security features are built to fail (or documented wrong).txt 6.2 KiB
2019-02-26 - Part 60 - same old sins and incompetence! .txt 4.7 KiB
2020-02-24 - Part 62 - Windows shipped with end-of-life components.txt 4.9 KiB
2020-03-10 - Part 63 - program defaults, settings, policies ... and (un)trustworthy computing .txt 5.6 KiB
2020-03-27 - Part 64 - Windows Defender loads and exeutes arbitrary DLLs.txt 9.1 KiB
2020-03-27 - Part 65 - unsafe, easy to rediect paths all over .txt 8.9 KiB
2020-03-28 - Part 66 - attachment manager allows to load arbitrary DLLs .txt 3.4 KiB
2020-04-13 - Part 67 - we maintain 20 year old bugs since we don't care about our customers safety and security.txt 6.5 KiB
2020-06-03 - Part 68 - qUACkery is futile!.txt 3.1 KiB
2020-06-03 - Part 69 - security remarks are as futile as the qUACkery!.txt 4.0 KiB
2020-07-23 - Part 70 - CVE-2014-0315 alias MS14-019 revisited .txt 3.7 KiB
2020-12-15 - Part 71 - where compatibility means vulnerability .txt 13 KiB
2021-03-03 - Part 72 - compatibility trumps security .txt 4.6 KiB
2021-03-08 - Part 73 - ignorance (of security advisories) is bliss!.txt 5.7 KiB
2021-04-02 - Part 74 - Windows Defender SmartScreen is rather DUMP, it allows denial of service.txt 3.3 KiB
2021-04-29 - Part 75 - Bypass of SAFER alias Software Restriction Policies NOT FIXED .txt 7.9 KiB
2021-04-29 - Part 76 - arbitrary code execution WITH elevation of privilege in user-writable directories below SystemRoot.txt 8.4 KiB
2021-05-14 - Part 77 - access without access permission.txt 8.4 KiB
2021-10-13 - Part 78 - completely outdated, vulnerable open source component(s) shipped with Windows 10&11 .txt 2.1 KiB
2021-10-14 - Part 79 - Local Privilege Escalation via Windows 11 Installation Assistant.txt 4.3 KiB
2022-05-10 - Part 80 - 25 (in words TWENTY-FIVE) year old TRIVIAL bug crashes CMD.exe.txt 2.8 KiB
2023-02-10 - Part 81 - enabling UTF-8 support breaks existing code.txt 5.5 KiB
2023-02-22 - Part 82 - INVALID BOGUS AppLocker rules disable SAFER on Windows 11 22H2.txt 864 B
2023-03-15 - Part 83 - instead to fix even their most stupid mistaskes, they spill barrels of snakeoil to cover them (or just leave them as-is) .txt 5.5 KiB
2023-03-22 - Part 84 - (no) fun with COMSPEC .txt 4.7 KiB