The National Security Agency’s open source reverse engineering tool, Ghidra, is impacted by a vulnerability, but security experts — including those at the NSA familiar with Ghidra — tell CyberScoop it would be pretty difficult to be attacked via the vulnerability if you know how to reverse engineer malware. The vulnerability, CVE-2019-16941, would allow hackers to compromise exposed systems when Ghidra’s experimental mode is running, according to the bug announcement from the National Institute of Standards and Technology. In theory, this vulnerability would allow arbitrary code to be executed against a Ghidra user if a malicious XML document — a plain text file often used to store data — is introduced. But that introduction is unlikely to happen because running these kinds of files through Ghidra would be pretty unusual, researchers told CyberScoop. “These files are not normally shared among users and not normally part of the distribution,” the NSA […]
The post NSA’s reverse engineering tool Ghidra impacted by a bug — but there’s no need to panic appeared first on CyberScoop.
Continue reading NSA’s reverse engineering tool Ghidra impacted by a bug — but there’s no need to panic→