VU#307144: mingw-w64 by default produces executables that opt in to ASLR, but are not compatible with ASLR

ASLR is an exploit mitigation technique used by modern Windows platforms. For ASLR to function, Windows executables must contain a relocations table. Despite containing the “Dynamic base” PE header, which indicates ASLR compatibility, Windows executabl… Continue reading VU#307144: mingw-w64 by default produces executables that opt in to ASLR, but are not compatible with ASLR

Posted in Uncategorized

VU#304725: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange

Bluetooth firmware or operating system software drivers may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange,which may allow a remote attacker to obtain the encryption key used by the device. Continue reading VU#304725: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange

VU#631579: Hardware debug exception documentation may result in unexpected behavior

In some circumstances,some operating systems or hypervisors may not expect or properly handle an Intel architecture hardware debug exception. The error appears to be due to developer interpretation of existing documentation for certain Intel architecture interrupt/exception instructions,namely MOV SS and POP SS. Continue reading VU#631579: Hardware debug exception documentation may result in unexpected behavior

VU#283803: Integrated GPUs may allow side-channel and rowhammer attacks using WebGL ("Glitch")

Some platforms with integrated GPUs,such as smartphones,may allow both side-channel and rowhammer attacks via WebGL,which may allow a remote attacker to compromise the browser on an affected platform. An attack technique that leverages these vulnerabilities is called"GLitch." Continue reading VU#283803: Integrated GPUs may allow side-channel and rowhammer attacks using WebGL ("Glitch")