Michael DePlante
@izobashi
Security Researcher at the Zero Day Initiative. DMs open.
ID: 385227667
https://izobashi.info/ 05-10-2011 03:22:21
54 Tweet
3,3K Followers
721 Following
2023 MVR Swag drop just landed! Congratulations to all of the other talented researchers that made the list. Shoutout Microsoft Security Response Center for recognizing these efforts and sending out this gear 🔥
[ZDI-24-207|CVE-2023-42902] Apple macOS VideoToolbox Out-Of-Bounds Write Remote Code Execution Vulnerability (CVSS 8.8; Credit: Michael DePlante (Michael DePlante) of Trend Micro's Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…
In the 1st of a 3 part series, Michael DePlante & Nicholas Zubrisky detail link following bugs. How they work, what vendors do to prevent them, and how researchers can bypass protections to exploit them. Includes examples from recent 0-days in #Avast. zerodayinitiative.com/blog/2024/7/29…
In the 2nd part of the series on using link following bugs for LPE on #Windows, Michael DePlante & Nicholas Zubrisky detail using alternate data stream to bypass protections. Examples getting LPE on ESET provided. Stay tuned for the final blog entry tomorrow. zerodayinitiative.com/blog/2024/7/30…
In the final blog of their series on link following LPEs, Michael DePlante and Nicholas Zubrisky detail issues with #Intel and #PaperCut that weren't quite resolved as expected. They also describe using Task Scheduler to cause problems on boot. Read the details at zerodayinitiative.com/blog/2024/7/31…
[ZDI-24-1120|CVE-2024-27829] Apple macOS AppleVADriver Out-Of-Bounds Write Remote Code Execution Vulnerability (CVSS 8.8; Credit: Michael DePlante (Michael DePlante) of Trend Micro's Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…
[ZDI-24-1287|CVE-2024-44160] Apple macOS AppleVADriver Out-Of-Bounds Write Remote Code Execution Vulnerability (CVSS 8.8; Credit: Michael DePlante (Michael DePlante) of Trend Micro's Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…
[ZDI-24-1321|CVE-2024-40841] Apple macOS AppleVADriver Out-Of-Bounds Write Remote Code Execution Vulnerability (CVSS 8.8; Credit: Michael DePlante (Michael DePlante) of Trend Micro's Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…
[ZDI-24-1444|CVE-2024-44218] Apple SceneKit Improper Validation of Array Index Remote Code Execution Vulnerability (CVSS 8.8; Credit: Michael DePlante (Michael DePlante) of Trend Micro's Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…
Thank you Microsoft Security Response Center for inviting Trend Zero Day Initiative to the researcher party ah Blackhat. Come same hi to grab a ZDI challenge coin. Petrus Germanicus Michael DePlante