[FD] Microsoft PlayReady - complete client identity compromise

2024-05-09 Thread Security Explorations
ibility to constantly increase the bar and with the use of all available technological means. Thank you. Best Regards, Adam Gowdiak -- Security Explorations - AG Security Research Lab https://security-explor

[FD] Microsoft PlayReady toolkit - codes release

2024-05-06 Thread Security Explorations
in a more in-depth understanding of Microsoft PlayReady technology operation and its limitations. We hope it helps others avoid some mistakes too. Thank you. Best Regards, Adam Gowdiak -- Security Explorations - AG Security Research La

[FD] Microsoft PlayReady white-box cryptography weakness

2024-05-01 Thread Security Explorations
of a content key. In the context of no confirmation / denial [4] from the platforms indicated above as being affected, the crypto check should constitute sufficient proof to support that claim alone. Thank you. Best Regards, Adam Gowdiak -- Security Explorations

[FD] Microsoft PlayReady deficiencies / content key sniffing on Windows

2024-04-02 Thread Security Explorations
s 10 and 11 x64 systems across various builds from late 2022 till Mar 2024 (systems without and with HW DRM capability). Thank you. Best Regards, Adam Gowdiak ------ Security Explorations - AG Security Research Lab https://security-explorations.com

[FD] Security vulnerabilities in Telit Cinterion IoT (formerly Thales) devices

2023-04-24 Thread Security Explorations
lt is not to inform vendors about security findings anymore and to disclose the results of research to the public without prior notification. Thank you. Best Regards, Adam Gowdiak - Security Explorations - AGSecRec Lab https://security-explorations.com ---

Re: [FD] Microsoft PlayReady security research

2023-03-21 Thread Security Explorations
et me say that Oracle, which had tons of reasons to ignore my person has always delivered a response to my inquiry... Thank you. Best Regards, Adam Gowdiak -- Security Explorations - AG Security Research Lab https://security-explorations.com ---

[FD] Microsoft PlayReady security research

2022-12-10 Thread Security Explorations
Hello, Microsoft PlayReady is one of the key technologies used by PayTV industry and OTT platforms for Digital Rights Management and content security in general. According to Microsoft, PlayReady Server SDK has several hundred service provider licensees. Security Explorations conducted security

[FD] [SE-2019-01] Gemalto SIM card applet loading vulnerability

2019-04-14 Thread Security Explorations
Hello All, On Mar 20, 2019 Security Explorations reported a security vulnerability (Issue 19) to Gemalto [1], that made it possible to achieve read, write and native code execution access on company's card (GemXplore 3G v3.0). On Mar 30, 2019, Gemalto provided is with the results o

[FD] [SE-2019-01] Java Card vulnerabilities

2019-03-20 Thread Security Explorations
eys or existence of some other means facilitating it (a vulnerability in card OS, installed applications, exposed interfaces, etc.). Such scenarios cannot be excluded though. On Mar 20 2019, Security Explorations sent vulnerability notices to Oracle and Gemalto containing detailed information abo

Re: [FD] [SRP-2018-02] Security of NC+ SAT TV platform and ST chipsets

2019-02-13 Thread Security Explorations
- Security Explorations http://www.security-explorations.com "We bring security research to a new level" - W dniu 22.01.2019 o 11:21, Security Explorations pisze: Hello All, The report presenting the results of our S

[FD] [SRP-2018-02] Security of NC+ SAT TV platform and ST chipsets

2019-01-22 Thread Security Explorations
e art. Thank you. Best Regards, Adam Gowdiak - Security Explorations http://www.security-explorations.com "We bring security research to a new level" - References: [1] NC+     https://ncplus.p

[FD] [SRP-2018-01] Reverse engineering tools for ST DVB chipsets (public release)

2018-06-08 Thread Security Explorations
igned with content providers). In that context, we see no reason to continue keeping SRP-2018-01 material under wraps. Thank you. Best Regards, Adam Gowdiak - Security Explorations http://www.security-explorations.com "We bring security research

[FD] [SE-2011-01] The origin and impact of vulnerabilities in ST chipsets

2018-04-21 Thread Security Explorations
rmation to general public (vulnerable chipset models, whether vulnerable IP is used in other products, possible remediation steps, etc). Security Explorations will continue engaging various entities such as US-CERT in a goal to acquire accurate information pertaining to the impact and addressing o

Re: [FD] [SE-2011-01] Security contact at Canal+ Group ?

2018-04-03 Thread Security Explorations
Hello Nicolas, I have such a contact - I'll reply to you privately. Thank you very much for your prompt response and for providing us with this contact information. We do appreciate it. -- Best Regards, Adam Gowdiak - Security Explorations

[FD] [SE-2011-01] Security contact at Canal+ Group ?

2018-04-03 Thread Security Explorations
TB devices vulnerable to STMicroelectronics flaws, please let us know. Thank you. Best Regards, Adam Gowdiak - Security Explorations http://www.security-explorations.com "We bring security research

[FD] [SE-2011-01] Regarding liabilities in SW / HW (ST chipsets flaws' case)

2018-02-19 Thread Security Explorations
Hello All, Today, Security Explorations sent an official inquiry to NC+ operator regarding the replacement process of set-top-box devices conducted by the company in Poland (whether STBs vulnerable to STMicroelectronics vulnerabilities are replaced, whether the replacement process is required

[FD] [SE-2011-01] A security issue with a Multiroom service of NC+ SAT TV platform

2018-02-06 Thread Security Explorations
sage from 01-Feb-2012". Thank you. -- Best Regards, Adam Gowdiak ----- Security Explorations http://www.security-explorations.com "We bring security research to a new level" - References: [1] NC

[FD] [SE-2011-01] Some ideas regarding security of ST DVB chipsets

2017-11-13 Thread Security Explorations
am Gowdiak - Security Explorations http://www.security-explorations.com "We bring security research to the new level" - ___ Sent through the Full Disclosure mailing list http

[FD] [SE-2012-01] Yet another broken security fix in IBM Java 7/8

2016-04-12 Thread Security Explorations
further upon finding out that package access restrictions introduced in their internal build of Java blocked our POC code for Issue 70. Thank you. -- Best Regards, Adam Gowdiak ----- Security Explorations http://www.security-explorations.com "We brin

Re: [FD] [SE-2012-01] Broken security fix in IBM Java 7/8

2016-04-05 Thread Security Explorations
-3009 identifier strings appears). Thank you. -- Best Regards, Adam Gowdiak - Security Explorations http://www.security-explorations.com "We bring security research to the new level" - Reference

[FD] [SE-2012-01] Broken security fix in IBM Java 7/8

2016-04-04 Thread Security Explorations
am Gowdiak - Security Explorations http://www.security-explorations.com "We bring security research to the new level" - References: [1] IBM developer kits http://www.ibm.com/developerworks/java/jdk/

[FD] [SE-2012-01] Broken security fix in Oracle Java SE 7/8/9

2016-03-09 Thread Security Explorations
Hello All, On Mar 07, 2016 Security Explorations modified its Disclosure Policy [1]. As a result, we do not tolerate broken fixes any more. If an instance of a broken fix for a vulnerability we already reported to the vendor is encountered, it gets disclosed by us without any prior notice. The

[FD] [SE-2014-02] Errata document for Issue 42 (CVE-2015-4871 affecting Java SE 7)

2015-11-30 Thread Security Explorations
Hello All, On Jun 30, 2015 Security Explorations reported a security vulnerability (Issue 42 assigned CVE-2015-4871) to Oracle affecting Java SE 7 [1]. In our original report [2], we indicated that the vulnerability had its origin in klassItable::initialize_itable_for_interface method&#

[FD] [SE-2014-02] Google App Engine Java security sandbox bypasses (Issue 42)

2015-10-21 Thread Security Explorations
bit. Thank you. Best Regards, Adam Gowdiak ----- Security Explorations http://www.security-explorations.com "We bring security research to the new level" - References: [1] The Java Virtual Machine Specification, Java SE 7 Edition http://docs.oracle

[FD] Oracle CSO numbers, security hygiene and fixes at the same time

2015-08-16 Thread Security Explorations
es, Oracle claimed that "it occasionally allowed the patches to be released the end of the month when the CPU was issued [9]. As a result some of these patches have been delayed". Thank you. Best Regards, Adam Gowdiak - Security Exploratio

[FD] [SE-2014-02] Unconfirmed / unpatched vulnerabilities in Google App Engine

2015-05-14 Thread Security Explorations
Hello All, Security Explorations decided to release technical details as well as accompanying Proof of Concept codes (three complete GAE Java sandbox escapes) for security issues identified in Google App Engine for Java after initial Issues 1-31 [1] have been addressed by the company. All

[FD] [SE-2014-02] Some additional GAE Java security sandbox bypasses

2015-05-06 Thread Security Explorations
Hello All, Security Explorations released technical details and POC codes for additional security vulnerabilities found in Google App Engine for Java. All relevant materials can be found at our SE-2014-02 project details page: http://www.security-explorations.com/en/SE-2014-02-details.html

[FD] [SE-2014-02] Google App Engine Java security sandbox bypasses (details)

2015-03-16 Thread Security Explorations
ment in Google's own yard. Thank you. Best Regards, Adam Gowdiak - Security Explorations http://www.security-explorations.com "We bring security research to the new level" - References: [1] Secur

[FD] [SE-2014-02] Google App Engine Java security sandbox bypasses (status update)

2014-12-16 Thread Security Explorations
ccount and making it possible to complete our project. We really appreciate it. Thank you. Best Regards, Adam Gowdiak ----- Security Explorations http://www.security-explorations.com "We bring security

[FD] [SE-2014-02] Google App Engine Java security sandbox bypasses (project pending completion / action from Google)

2014-12-06 Thread Security Explorations
share the results of our research with the security community. Thank you. Best Regards, Adam Gowdiak - Security Explorations http://www.security-explorations.com "We bring security research to the new level" -

[FD] [SE-2014-01] Missing patches / inaccurate information regarding Oracle Oct CPU

2014-10-31 Thread Security Explorations
as an indirect acknowledgment of a Java security mess spilling beyond the usual victim (applets / browser plugin). Thank you. Best Regards, Adam Gowdiak - Security Explorations http://www.security-exploration

[FD] [SE-2014-01] Breaking Oracle Database through Java exploits (details)

2014-10-14 Thread Security Explorations
nts. Java security issues can pose a significant security risk to any software that relies on a vulnerable Java VM implementation processing untrusted, potentially malicious Java code. Oracle Database is no exceptions here. Thank you. Best Regards, Adam Gowdiak -

[FD] [SE-2014-01] Security vulnerabilities in Oracle Database Java VM

2014-06-15 Thread Security Explorations
Hello All, Security Explorations discovered multiple security issues in the implementation of a Java VM embedded in Oracle Database software [1]. Discovered security issues violate many "Secure Coding Guidelines for the Java Programming Language" [2]. Most of them demonstrate a

Re: [FD] [SE-2013-01] Security vulnerabilities in Oracle Java Cloud Service (details)

2014-04-01 Thread Security Explorations
On 2014-04-01 10:40, Security Explorations wrote: We take this opportunity to encourage all customers of Oracle Java Cloud Service that signed up for the service between Jun 2012 and Jan 2013 in either US1 or EMEA1... It looks April Fools' Day is playing with us too...There is some

[FD] [SE-2013-01] Security vulnerabilities in Oracle Java Cloud Service (details)

2014-04-01 Thread Security Explorations
Hello All, Security Explorations decided to release technical details and accompanying Proof of Concept codes for security vulnerabilities discovered in the environment of Oracle [1] Java Cloud Service [2]. All relevant materials can be found at the following location: http://www.security