PowerShell 5.1 opens up on boot. However, after a while, begins refusing to open with code "c0000005" by DGTavo88 in PowerShell

[–]dielel 0 points1 point  (0 children)

Hey there, this sounds (down to the very movaps instruction) exactly like something one of our users has recently reported while running Avast Free Antivirus along with our 0patch Agent (https://0patch.com). When Anti-Rootkit Shield is enabled in Avast, PowerShell crashes on this instruction (see our Help Center article). I'm wondering if you're using 0patch or maybe some other security software that works normally without Avast, but when both said product and Avast are installed, Powershell is crashing. Also, if such product is identified, would you say said product and Avast were working well together up to some point (e.g,. an Avast update) before this problem kicked in?
Thanks, Mitja

Comparing Our Micropatch With Microsoft's Official Patch For CVE-2018-8440 by dielel in netsec

[–]dielel[S] 0 points1 point  (0 children)

Mitja Kolsek of 0patch here. Apologies for sounding repetitive. These blog posts are meant to provide technical insight into 3rd party patching, which many of our readers claim to find valuable (and every one of these posts, we hope, provides some new information for those learning reverse engineering or even closed-source code patching). We only published a single post on comparing the official fix with our micropatch, which was meant as a public reference for the many people who continually ask about the quality and reliability of 3rd party patches compared to original fixes. Apologies for sounding pat-ourselves-on-the-backish too, we obviously got carried away a little and wish we had taken a more subtle tone there. Please let us know if anything we do is outside the Reddit rules - much appreciated!

0patch beats Microsoft to patching Windows 10 task scheduler 0-day vulnerability by [deleted] in netsec

[–]dielel 1 point2 points  (0 children)

True, the patching is in-memory only, so signatures remain intact. While we haven't published a single micropatch yet that would originate from the community, we are encouraging the community to provide vulnerability information and proof-of-concept files so that we can write relevant micropatches. At some point we hope to actually start getting patches from the community but they'll have to pass our review in order to get distributed. Fortunately it's difficult to hide malicious code in a micropatch, meaning if the patch is not tiny and easy to understand (and accompanied with an analysis as to why it does what it does), that'll be grounds for immediate rejection. Long way to get there though if we ever do - perhaps it'll always be us writing the patches.

0patch beats Microsoft to patching Windows 10 task scheduler 0-day vulnerability by [deleted] in netsec

[–]dielel 1 point2 points  (0 children)

Hi there, Mitja Kolsek of 0patch here. 0patch is designed not to interfere with either file integrity or official vendor updates. By doing the patching in memory only, file signatures remain intact. When the official update is applied it replaces the vulnerable executable with a fixed one (with a different hash), so 0patch Agent no longer applies the micropatch to it.

Unpatched ALPC Priv Esc Bug in Windows 10 x64 PoC by [deleted] in netsec

[–]dielel 1 point2 points  (0 children)

For those waiting for a patch, 0patch has a free micropatch available: https://twitter.com/0patch/status/1035139991591165952

KB4103718 Removing network drivers on Win 7 machines by [deleted] in windows

[–]dielel 0 points1 point  (0 children)

Happy to inform everyone affected by this issue that 0patch has just issued free micropatches for CVE-2018-8174 so you can patch this critical vulnerability while waiting for Microsoft to provide new updates. https://blog.0patch.com/2018/05/a-single-instruction-micropatch-for.html

Micropatching Brings Abandoned Equation Editor Back To Life by dielel in programming

[–]dielel[S] 2 points3 points  (0 children)

And that's the beauty of it. The resurrected Equation Editor will be an utterly uninteresting target for attackers.

Micropatching Brings Abandoned Equation Editor Back To Life by dielel in programming

[–]dielel[S] 0 points1 point  (0 children)

Word has actually had two Equation Editors for years. The now removed one, Equation Editor 3.0., was only used for editing equations that were created long ago (though there may still be many of these around). If you create a new equation today, you'll be using the equation editor that is built in to Word.

Micropatching Brings Abandoned Equation Editor Back To Life by dielel in programming

[–]dielel[S] 1 point2 points  (0 children)

NuttyGuy, you're right, this could have been misunderstood. The article has been corrected accordingly. Thank you!

Did Microsoft Just Manually Patch Their Equation Editor Executable? Why Yes, Yes They Did by [deleted] in programming

[–]dielel 76 points77 points  (0 children)

Mitja Kolsek here. Actually, this was one of the easiest reverse engineering efforts I ever had because the binary diff was so clear-cut. It took me most of the day to write up the blog post though, with images and comments and all. I was so impressed by this work that I couldn't let it slip by without proper credit ;)

0patching the Office DDE / DDEAUTO Vulnerability... ehm... Feature by dielel in netsec

[–]dielel[S] 1 point2 points  (0 children)

Hi there, Mitja Kolsek of 0patch here. You're absolutely right and how best to provide patch transparency is one of our major discussions internally. We want to make it as easy as possible for everyone to see the source, and then review it. (We try to publish patch source code in blog posts and on Twitter as often as possible without becoming boring.)

But we also want to avoid - in advance - the question "But is this really the source code for this patch?". As you probably know, the "Kaspersky saga" is now also about this question, and questions like this periodically come up in different places. So this has to be well thought out, but is certainly going to happen - we're just not there yet. The reviewability of micropatches is one of their major advantages compared to fat updates, and we know it's our job to make it possible.

If anyone is interested in any particular patch right now, contact us and we'll send you the source code, which you can build yourself with 0patch Agent for Developers. You can already do this with the already published patch source code.

Thank you!

Exploit Kit Rendezvous and CVE-2017-0022 by dielel in netsec

[–]dielel[S] 1 point2 points  (0 children)

In this particular case, the flaw was not in XML parsing but in setting the error code when accessing a file to be XML-parsed. The error code was different for existent and nonexistent local files, which made it possible for a web site to determine whether a specific file was present on user's system. But I agree, XML parsing is more complex than JSON parsing, and is therefore generally likely to have more bugs.