Two QEMU Vulnerabilities Fixed in Ubuntu 24.04 LTS

Recently, two memory-related flaws were discovered in QEMU, a popular open-source machine emulator and virtualizer. The vulnerabilities, identified as CVE-2024-26327 and CVE-2024-26328, affect QEMU versions 7.1.0 through 8.2.1. Both vulnerabilities stem from ...

CISA Report: Memory Safety Risks in Critical Open Source Projects

Open-source projects are the cornerstone of modern software infrastructure, powering everything from web browsers to mobile apps and cloud services. These projects, contributed to and maintained by communities worldwide, enable innovation and ...

QNAP Patches: Medium Severity Flaws in OTS QuTS Fixed

In recent updates, QNAP, a prominent Taiwanese company specializing in network-attached storage (NAS) solutions, has diligently addressed several vulnerabilities within its QTS and QuTS hero operating systems. These QNAP patches are crucial ...
business smb risk

5 Buffer Overflow Vulnerabilities in Popular Apps

The 2019 CWE Top 25 Most Dangerous Software Errors lists improper restriction of operations within the bounds of a memory buffer as the most critical weakness that leads to a dangerous vulnerability ...
Security Boulevard

Ethical hacking: Buffer overflow

| | Buffer Overflow
Introduction to buffer overflows When taking external input, an application needs to allocate memory to store that input. Many high-level programming languages will do this behind the scenes, but... Go on to ...
EH-Net - Bango - From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt - Arnold!

From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt

While I’ve written a lot of code in my time, I don’t think I’ve ever firmly appreciated how complex it can be to write secure code. We go about our lives taking ...

Mitigating Buffer Overflow Attacks in Linux/Unix

A buffer overflow is the most common and the most serious threat to Linux/Unix operating systems. Buffer overflows occur when code running in unprotected memory in a buffer overwrites memory in an ...
NVR Software Flaw Threatens Thousands of Devices

NVR Software Flaw Threatens Thousands of Devices

A network video recorder (NVR) application used by organizations from around the world to control surveillance cameras contains a critical vulnerability that could expose devices to hacking. The flaw was found by ...
Security Boulevard

Three Categories of Buffer Overflow in the JRE

Some people think that writing code in Java is a silver bullet against implementation flaws such as buffer overflows. The truth is a little murky. Certainly, there is no provision for overflows ...