buffer overflow

Winsage
May 5, 2026
Microsoft will include the psmounterex.sys driver in its Vulnerable Driver Blocklist in the April 2026 security update, affecting third-party backup applications that use this driver for image mounting and Volume Shadow Copy Service (VSS) snapshots. This decision addresses CVE-2023-43896, a critical buffer overflow vulnerability. Affected software includes Macrium Reflect, Acronis Cyber Protect Cloud, UrBackup Server, and NinjaOne Backup on Windows 11, Windows 10, and Windows Server platforms. Users may face issues during image-mount operations, receiving error messages related to VSS timeouts and Code Integrity errors in the Event Viewer. To check if a system is affected, users can look for Event ID 3077 in the Code Integrity Operational log. Microsoft recommends upgrading to newer versions of backup applications that do not use blocked drivers and advises against uninstalling or delaying the April update. Additionally, the update may cause certain Windows Server 2025 devices to boot into BitLocker recovery mode and has led to out-of-band updates for Windows Server update failures and restart loops on domain controllers.
Tech Optimizer
May 5, 2026
Patches have been released for all identified vulnerabilities in PostgreSQL and MariaDB, with strong recommendations for users to upgrade to the latest fixed versions. A zero-day flaw in PostgreSQL, classified as CVE-2026-2005, is a heap-based buffer overflow issue in the "pgcrypto" extension. This vulnerability allows attackers to exploit specially crafted input, leading to out-of-bounds writes and potential remote code execution on the database server. It affects all supported versions of PostgreSQL and has been addressed in updates v18.2, v17.8, v16.12, v15.16, and v14.21. The flaw has a high-severity rating of CVSS 8.8 out of 10 and has existed since 2005.
Winsage
May 4, 2026
Microsoft has acknowledged that the April 2026 security updates have disrupted the functionality of various third-party backup applications using the psmounterex.sys driver, raising concerns among users. The issue primarily affects software leveraging the Volume Shadow Copy Service (VSS) snapshots, leading to failures due to VSS service timeouts. Notable impacted products include Macrium Reflect, Acronis Cyber Protect Cloud, UrBackup Server, and NinjaOne Backup, used on Windows 11, Windows Server, and Windows 10 devices. Disruptions can manifest as failures to mount backup image files, errors or timeouts when browsing or restoring from backup images, and error messages related to VSS timeouts. Microsoft updated its support documentation to clarify that the April updates included a security hardening change that added psmounterex.sys to the vulnerable driver blocklist to protect against a high-severity buffer overflow vulnerability (CVE-2023-43896). Affected users are advised to upgrade to newer application versions with updated drivers and not to uninstall or pause the security update. Users can check if the Microsoft Vulnerable Driver Blocklist is blocking a driver by looking for Event ID 3077 in the Code Integrity Operational log. Additionally, Microsoft has alerted users that some Windows Server 2025 devices may boot into BitLocker recovery mode after installing the KB5082063 update and has issued out-of-band updates to address installation failures and restart loops affecting Windows Server systems after the April 2026 updates.
Winsage
November 12, 2025
On November 12, 2025, Microsoft released patches for 63 vulnerabilities, including four classified as Critical and 59 as Important. Notably, CVE-2025-62215, a privilege escalation flaw in the Windows Kernel with a CVSS score of 7.0, is actively exploited. This vulnerability allows an authorized attacker to elevate privileges locally through a race condition. Additionally, Microsoft patched two heap-based buffer overflow vulnerabilities (CVE-2025-60724 and CVE-2025-62220) with CVSS scores of 9.8 and 8.8, respectively, which could lead to remote code execution. Another significant vulnerability is CVE-2025-60704, a privilege escalation flaw in Windows Kerberos with a CVSS score of 7.5, enabling attackers to impersonate users and control a domain. Other vendors, including Adobe, Amazon Web Services, and Apple, also released security updates addressing various vulnerabilities.
TrendTechie
October 18, 2025
Many methods of console piracy have emerged over time, often exploiting unintentional vulnerabilities in licensed games. For example, the PSP was easily hacked due to flaws in games like Grand Theft Auto: Liberty City Stories and Medal of Honor: Heroes, which allowed users to manipulate save files to gain access to the system. A debug code in Alien: Resurrection for the PS1 enabled users to swap discs without turning off the console. Various makeshift tools have been used for hacking, such as a paperclip to exploit the Nintendo Switch and tweezers to access dormant memory sections in the Wii. The Nintendo 3DS was hacked using a magnet to trick the lid sensor, allowing access to developer mode. The Xbox 360 faced significant modding due to its firmware modification capabilities. A notable method involved drilling into the drive to bypass rewrite protection, known as the "Kamikaze Hack." While piracy methods have evolved, modern consoles have become increasingly secure, with fewer successful hacks reported in recent years. The appeal of piracy has diminished as subscription services and sales provide easier access to games.
Winsage
October 8, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert about a significant vulnerability in Microsoft Windows, identified as CVE-2021-43226. This flaw allows attackers to elevate their privileges to SYSTEM level, threatening enterprise networks. It exists within the Common Log File System (CLFS) driver, enabling local, privileged attackers to bypass security measures and gain unauthorized control over systems running various Windows versions, including Windows 10, 11, and Server 2016, 2019, and 2022, as well as legacy systems like Windows 7 SP1 and Server 2008 R2 SP1. The vulnerability arises from improper validation of user-supplied data, leading to buffer overflow and arbitrary code execution without user interaction. It has a CVSS score of 7.8, indicating high severity, and proof-of-concept exploit code is already circulating in underground forums. CISA has set a remediation deadline of October 27, 2025, mandating federal agencies and critical infrastructure operators to implement patches. Recommendations for mitigation include immediate patching, strengthening endpoint controls, implementing layered defenses, continuous monitoring, regular vulnerability management, and maintaining a robust incident response program.
Winsage
September 9, 2025
In September 2025, Microsoft released security updates addressing three significant vulnerabilities in the Windows kernel among a total of 86 CVEs. The notable vulnerabilities include: 1. CVE-2025-54110: An Elevation of Privilege vulnerability rated 8.8, involving an integer overflow in the Windows kernel that could allow an attacker to escalate privileges locally. Discovered by an anonymous researcher on Mastodon. 2. CVE-2025-53804: An information disclosure vulnerability rated 5.5, allowing exposure of specific memory addresses within kernel space, reported by Lewis Lee. 3. CVE-2025-53803: A vulnerability allowing disclosure of memory addresses through error messages, credited to Lewis Lee and three other researchers. Other high-risk vulnerabilities addressed include: 1. CVE-2025-54918: A Windows NTLM Elevation of Privilege vulnerability rated 8.8, remotely exploitable due to improper authentication, discovered by Brian De Houwer. 2. CVE-2025-55234: An 8.8-rated Windows SMB Elevation of Privilege/Improper Authentication issue. 3. CVE-2025-54916: A Windows NTFS Remote Code Execution vulnerability rated 7.8. 4. CVE-2025-54098: A Windows Hyper-V Elevation of Privilege vulnerability rated 7.8. 5. CVE-2025-54093: A Windows TCP/IP Driver Elevation of Privilege vulnerability rated 7.0. Additionally, other IT vendors like Adobe, SAP, and Ivanti released critical updates on the same day.
Search