Skip to content

Results of my recent PostScript Charstring security research unveiled

Ten post nie jest dostępny w języku polskim!

{ 2 } Comments

  1. Yuhong Bao | 23-cze-15 at 17:27:27 | Permalink

    I think ATMFD was first built into Windows with Win2000. Previously a separate ATM has to be installed to get it.

  2. anyuh | 13-lip-15 at 01:06:04 | Permalink

    could you send me a link to get adobe reader 5’s cooltype.dll debug symbol please?

{ 23 } Trackbacks

  1. […] bug – makes it one of the most interesting security issues I have discovered so far,” he says […]

  2. […] bug – makes it one of the most interesting security issues I have discovered so far,” he says […]

  3. […] Google Project Zero to jeden z naszych najlepszych branżowych towarów eksportowych. Gdy kolejny wpis na jego blogu zawiera słowa „spędziłem kilka tygodni nad inżynierią wsteczną biblioteki” to […]

  4. […] Google Project Zero researcher has publicly disclosed details on a number of patched Adobe and Microsoft vulnerabilities, including one in the Adobe Type Manager […]

  5. […] Google Project Zero researcher has publicly disclosed details on a number of patched Adobe and Microsoft vulnerabilities, including one in the Adobe Type Manager […]

  6. […] A ton of the technical material including exploit demos and PoC code has been made available by Jurczyk in the slides from talk, and his blog post. […]

  7. […] Google Project Zero researcher has publicly disclosed details on a number of patched Adobe and Microsoft vulnerabilities, including one in the Adobe Type Manager […]

  8. Really? | 2015-06-23 at 11:38:51 | Permalink

    […] Sort of related, this boils down to the Windows font rendering done by the kernel. What could go wrong with that? j00ru//vx tech blog : Results of my recent PostScript Charstring security research unveiled […]

  9. […] an article Jurczyk also shared his demonstration this month at Recon security conference and named it, “One […]

  10. […] expert Mateusz Jurczyk pomocí reverzního inženýrství objevil několik kritických zranitelností v ovladači Adobe Type Manager Font Driver (ATMFD.DLL), který […]

  11. […] a blog post the researcher also shared his presentation from the Recon security conference this month […]

  12. […] Veja todos os detalhes dessa descoberta no post realizado pelo pesquisador, incluindo dois video d… […]

  13. […] to his blog the most serious and interesting security issue he discovered so far was a really […]

  14. […] final il a présenté à la REcon 2015 ses slides (PDF) où il parle des failles importantes qu’il a trouvé et du contexte d’exploitation particulièrement agréable pour l’une des […]

  15. […] post del investigador también comparte su presentación en la conferencia de seguridad Recon este mes, […]

  16. 15 vulnerabilidades 0-day en Adobe Reader y Microsoft Windows

    El investigador del proyecto Google Project Zero, Mateusz Jurczyk, ha publicado un total de 15 vulnerabilidades críticas que afectan a Microsoft Windows y Adobe Reader. La investigación también se presentó en la Conferencia de seguridad REcon en Montre…

  17. […] Хакер Матеуш Юрчик (Mateusz [j00ru] Jurczyk) з підрозділу Google Project Zero виступив з доповіддю на конференції Recon 2015 у Монреалі, де розповів про головну діру в комп’ютерній безпеці – шрифтах. Він розкрив 15 серйозних вразливостей в Windows і Adobe Reader при рендерінгу шрифтів, в тому числі показав хак, який обходить всі механізми захисту від експлойтів. […]

  18. […] Research find many flaws in Font driver, but already patched – J00ru blog […]

  19. […] The Blog post of Jurczyk along with his presentation is available at: http://j00ru.vexillium.org/?p=2520 […]

  20. […] می توانید جزییات بیشتر این ماجرا را در وبلاگ شخصی آقای Mateusz Jurczyk از اینجا […]

  21. […] Hacking Team Leak Uncovers Another Windows Zero-Day, Fixed in Out-of-Band Patch – PATCHED – Another Microsoft vulnerability popped up this week, this one the result of the Hacking Team compromise that we discussed in last week’s post. It is a particularly nasty one, so bad that Microsoft offered a patch for it outside its normal patching schedule. Almost all versions of Windows appear to be affected. The issue resides in some code that handles Open Type fonts and, apparently, the exploit is even capable of escaping Chrome’s sandbox when the victim visits a malicious page in their browser. Both code execution and privilege escalation are possible using this vulnerability. This is the second time Microsoft has had to patch some serious issues with the Adobe Type Manager Font Driver (ATMFD) recently (other issues were reported in late June). […]

  22. […] http://j00ru.vexillium.org/?p=2520 […]

  23. […] Google Project Zero blog. The first four of them make a sort of a whitepaper accompanying the REcon slides, as they discuss the discovery and exploitation process of the BLEND vulnerability, providing some […]

Post a Comment

Your email is never published nor shared. Required fields are marked *