Moshe Kaplan
Moshe Kaplan
Fixed with https://github.com/googleprojectzero/winafl/pull/306
Closer on the side of paranoia, it may be worth segmenting the libmagic code away from the rest, given the possibility of an exploit targeting it. One possibility would be...
@dputtick : It would likely require moving the code interfacing with libmagic to a separate binary, so it could be limited to only reading files and not writing to the...
A while back I wrote a script based on PyPDF2 and Wand to sanitize PDFs by converting them into images and stitching them back together into a single PDF. It...
@Rafiot: I address that by extracting the text first and then embedding it inside of the PDF. See https://github.com/moshekaplan/SafePDF/blob/master/SafePDF.py#L53
- Exploiting libmagic - Writing a malicious binary to the second USB - Returning a fake MIMEtype
Unfortunately, this is the only reference I could find : https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-1606 , but it only has DoS and no code execution.
Note: This depends on #334
For an example of the output, see https://github.com/moshekaplan/SysinternalsEBPF/pull/1/checks
Is there a way Mark's existing work could be integrated in? https://github.com/markmckinnon/Autopsy-Plugins/tree/master/Thumbs_parser https://github.com/markmckinnon/Autopsy-Plugins/tree/master/Thumbcache_parser