Embed Notice
HTML Code
Corresponding Notice
- Embed this notice
翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Sunday, 21-Jul-2024 04:00:40 JST翠星石 @neko Pretty much ClownStrike doesn't do any testing on their patches and send out a dodgy "threat signature" file to almost all of the windows computers that are part of their botnet.
They have a windows kernel module written in sepples, which parses "threat signature" files with a ".sys" extension and applies them and someone went and tested in production by pushing one or more corrupted "threat signature" file(s), which caused the parser to de-reference a null-pointer and caused the NT kernel to crash.
I do wonder if de-referencing a NULL pointer in a Linux module will cause it to crash - I guess I better try it out.
https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/ (do not run the JavaScript on the page - it is all useless malware that doesn't do anything useful).