Security researchers at Prizm Labs discovered a critical zero-click remote code execution (RCE) vulnerability in the SuperNote Nomad e-ink tablet. Exploiting a flaw in the device's update mechanism, an attacker could remotely execute arbitrary code with root privileges by sending a specially crafted OTA update notification via a malicious Wi-Fi access point. The attack requires no user interaction, making it particularly dangerous. The vulnerability stemmed from insufficient validation of update packages, allowing malicious firmware to be installed. Prizm Labs responsibly disclosed the vulnerability to SuperNote, who promptly released a patch. This vulnerability highlights the importance of robust security measures even in seemingly simple devices like e-readers.
Google's Project Zero discovered a zero-click iMessage exploit, dubbed BLASTPASS, used by NSO Group to deliver Pegasus spyware to iPhones. This sophisticated exploit chained two vulnerabilities within the ImageIO framework's processing of maliciously crafted WebP images. The first vulnerability allowed bypassing a memory limit imposed on WebP decoding, enabling a large, controlled allocation. The second vulnerability, a type confusion bug, leveraged this allocation to achieve arbitrary code execution within the privileged Springboard process. Critically, BLASTPASS required no interaction from the victim and left virtually no trace, making detection extremely difficult. Apple patched these vulnerabilities in iOS 16.6.1, acknowledging their exploitation in the wild, and has implemented further mitigations in subsequent updates to prevent similar attacks.
Hacker News commenters discuss the sophistication and impact of the BLASTPASS exploit. Several express concern over Apple's security, particularly their seemingly delayed response and the lack of transparency surrounding the vulnerability. Some debate the ethics of NSO Group and the use of such exploits, questioning the justification for their existence. Others delve into the technical details, praising the Project Zero analysis and discussing the exploit's clever circumvention of Apple's defenses. The complexity of the exploit and its potential for misuse are recurring themes. A few commenters note the irony of Google, a competitor, uncovering and disclosing the Apple vulnerability. There's also speculation about the potential legal and political ramifications of this discovery.
Researchers at ReversingLabs discovered malicious code injected into the popular npm package flatmap-stream
. A compromised developer account pushed a malicious update containing a post-install script. This script exfiltrated environment variables and established a reverse shell to a command-and-control server, giving attackers remote access to infected machines. The malicious code specifically targeted Unix-like systems and was designed to steal sensitive information from development environments. ReversingLabs notified npm, and the malicious version was quickly removed. This incident highlights the ongoing supply chain security risks inherent in open-source ecosystems and the importance of strong developer account security.
HN commenters discuss the troubling implications of the patch-package
exploit, highlighting the ease with which malicious code can be injected into seemingly benign dependencies. Several express concern over the reliance on post-install scripts and the difficulty of auditing them effectively. Some suggest alternative approaches like using pnpm
with its content-addressable storage or sticking with lockfiles and verified checksums. The maintainers' swift response and revocation of the compromised credentials are acknowledged, but the incident underscores the ongoing vulnerability of the open-source ecosystem and the need for improved security measures. A few commenters point out that using a private, vetted registry, while costly, may be the only truly secure option for critical projects.
The blog post details a successful remote code execution (RCE) exploit against llama.cpp, a popular open-source implementation of the LLaMA large language model. The vulnerability stemmed from improper handling of user-supplied prompts within the --interactive-first
mode when loading a model from a remote server. Specifically, a carefully crafted long prompt could trigger a heap overflow, overwriting critical data structures and ultimately allowing arbitrary code execution on the server hosting the llama.cpp instance. The exploit involved sending a specially formatted prompt via a custom RPC client, demonstrating a practical attack scenario. The post concludes with recommendations for mitigating this vulnerability, emphasizing the importance of validating user input and avoiding the direct use of user-supplied data in memory allocation.
Hacker News users discussed the potential severity of the Llama.cpp vulnerability, with some pointing out that exploiting it requires a malicious prompt specifically crafted for that purpose, making accidental exploitation unlikely. The discussion highlighted the inherent risks of running untrusted code, especially within sandboxed environments like Docker, as the exploit demonstrates a bypass of these protections. Some commenters debated the practicality of the attack, with one noting the high resource requirements for running large language models (LLMs) like Llama, making targeted attacks less probable. Others expressed concern about the increasing complexity of software and the difficulty of securing it, particularly with the growing use of machine learning models. A few commenters questioned the wisdom of exposing LLMs directly to user input without robust sanitization and validation.
A critical remote code execution (RCE) vulnerability was discovered in the now-defunct mobile game Marvel: Contest of Champions (also known as Marvel Rivals). The game's chat functionality lacked proper input sanitization, allowing attackers to inject and execute arbitrary JavaScript code within clients of other players. This could have been exploited to steal sensitive information, manipulate game data, or even potentially take control of affected devices. The vulnerability, discovered by a security researcher while reverse-engineering the game, was responsibly disclosed to Kabam, the game's developer. Although a fix was implemented, the exploit served as a stark reminder of the potential security risks associated with unsanitized user inputs in online games.
Hacker News users discussed the exploit detailed in the blog post, focusing on the surprising simplicity of the vulnerability and the potential impact it could have had. Several commenters expressed amazement that such a basic oversight could exist in a production game, with one pointing out the irony of a game about superheroes being vulnerable to such a mundane attack. The discussion also touched on the responsible disclosure process, with users questioning why Kabam hadn't offered a bug bounty and acknowledging the author's ethical handling of the situation. Some users debated the severity of the vulnerability, with opinions ranging from "not a big deal" to a serious security risk given the game's access to user data. The lack of a detailed technical explanation in the blog post was also noted, with some users desiring more information about the specific code involved.
Multiple vulnerabilities were discovered in rsync, a widely used file synchronization tool. These vulnerabilities affect both the client and server components and could allow remote attackers to execute arbitrary code or cause a denial of service. Exploitation generally requires a malicious rsync server, though a malicious client could exploit a vulnerable server with pre-existing trust, such as a backup server. Users are strongly encouraged to update to rsync version 3.2.8 or later to address these vulnerabilities.
Hacker News users discussed the disclosed rsync vulnerabilities, primarily focusing on the practical impact. Several commenters downplayed the severity, noting the limited exploitability due to the requirement of a compromised rsync server or a malicious client connecting to a user's server. Some highlighted the importance of SSH as a secure transport layer, mitigating the risk for most users. The conversation also touched upon the complexities of patching embedded systems and the potential for increased scrutiny of rsync's codebase following these disclosures. A few users expressed concern over the lack of memory safety in C, suggesting it as a contributing factor to such vulnerabilities.
Summary of Comments ( 8 )
https://news.ycombinator.com/item?id=43615805
Hacker News commenters generally praised the research and write-up for its clarity and depth. Several expressed concern about the Supernote's security posture, especially given its marketing towards privacy-conscious users. Some questioned the practicality of the exploit given its reliance on connecting to a malicious Wi-Fi network, but others pointed out the potential for rogue access points or compromised legitimate networks. A few users discussed the inherent difficulties in securing embedded devices and the trade-offs between functionality and security. The exploit's dependence on a user-initiated firmware update process was also highlighted, suggesting a slightly reduced risk compared to a fully automatic exploit. Some commenters shared their experiences with Supernote's customer support and device management, while others debated the overall significance of the vulnerability in the context of real-world threats.
The Hacker News post discussing the 0-click RCE vulnerability in the SuperNote Nomad E-Ink tablet has generated a number of comments exploring various aspects of the vulnerability, its implications, and the SuperNote device itself.
Several commenters focus on the trade-offs between security and desired functionality, particularly regarding the device's cloud syncing feature. Some argue that the always-on nature of the sync feature, necessary for its intended seamless functionality, inherently increases the risk profile. The decision by SuperNote to leave Wi-Fi always enabled, even when the device is powered off, is highlighted as a key contributing factor to the vulnerability. The discussion touches upon the inherent difficulty of securing devices that require constant network connectivity.
The technical details of the vulnerability also receive attention. Commenters discuss the specifics of the exploit, including the use of maliciously crafted emails and the exploitation of a stack overflow vulnerability in the device's email client. The discussion highlights the importance of robust input sanitization and secure coding practices to prevent such vulnerabilities. Some commenters question the choice of technology used for the email client, suggesting that a simpler, less feature-rich implementation might have been more secure.
A recurring theme in the comments is the security of e-ink devices in general. Several users express concerns about the potential for similar vulnerabilities in other e-ink devices and the broader implications for the security of internet-connected devices in general. The relatively closed nature of the SuperNote ecosystem is also brought up, with some commenters suggesting that this may have contributed to the vulnerability going unnoticed for a longer period.
Several commenters praise the researchers for their responsible disclosure and the detailed write-up of the vulnerability. They acknowledge the importance of such research in improving the security of these devices.
Some comments delve into the practical implications of the vulnerability, discussing the potential for data theft and other malicious activities. The potential impact on users' privacy is a particular concern, given the sensitive nature of information often stored on such devices.
Finally, a few comments discuss the response from SuperNote, noting the company's acknowledgement of the vulnerability and their commitment to releasing a patch. There's some discussion about the timeliness of the response and the broader implications for the trust and reputation of the SuperNote brand.