You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/structural-file-format-exploit-detection.md
+50-2Lines changed: 50 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,7 +90,7 @@ Structural signals:
90
90
Pseudo‑logic:
91
91
92
92
```pseudo
93
-
# Flag undocumented TrueType opcodes leveraged by TRIANGULATION
93
+
# Flag undocumented TrueType bytecode leveraged by TRIANGULATION
- SAO/loop‑filter parameters or tile counts that force table allocations larger than the max allowed by libde265 (CVE‑2025‑29482): overly large band counts or slice dimensions.
183
+
- Box length/extent sizes that point past EOF (typical in CVE‑2025‑65586 PoCs discovered via fuzzing).
184
+
185
+
Pseudo‑logic:
186
+
187
+
```pseudo
188
+
# HEIF overlay bounds check
189
+
for overlay in heif_overlays:
190
+
if overlay.x < 0 or overlay.y < 0: mark_malicious("HEIF overlay negative offset")
191
+
if overlay.x + overlay.w > base.w or overlay.y + overlay.h > base.h:
192
+
mark_malicious("HEIF overlay exceeds base image (CVE‑2024‑41311 pattern)")
-[Researching TRIANGULATION – Detecting CVE‑2023‑41990 with single‑byte signatures](https://www.msuiche.com/posts/researching-triangulation-detecting-cve-2023-41990-with-single-byte-signatures/)
222
268
-[CVE‑2025‑43300: Critical vulnerability found in Apple’s DNG image processing](https://www.msuiche.com/posts/cve-2025-43300-critical-vulnerability-found-in-apples-dng-image-processing/)
223
269
-[LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices](https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/)
0 commit comments