Thursday, October 3, 2024
HomeSecurity NewsMicrosoft Launches VulnScan Tool to Detect Memory Corruption Bugs

Microsoft Launches VulnScan Tool to Detect Memory Corruption Bugs

Published on

Microsoft launched new tool Vulnscan that automates the process of detecting the root cause of memory corruption issues.Vulnscan will be part of Microsoft Security Risk Detection.

It is a tool designed and developed by MSRC allows users and companies to upload their app and have it automatically determine the vulnerability type and root cause of memory corruption bugs with the wide variety of Windows or Linux platforms.

It is one of the latest addition to the Microsoft Security Risk Detection service that is currently in beta, after being launched in September 2016, then named Project Springfield.

- Advertisement - EHA
VulnScan

Root Cause Detection-VulnScan

Most of the tools and features included with the Microsoft Security Risk Detection platform work using a technique called fuzzing, which searches for vulnerabilities that could enable awful performers to dispatch malicious attacks or just crash the system.

Also Read Google Chrome Will Block Tab-Under Behavior

Vulnscan bug detection during fuzz testing in memory-related issues.The tool helps security engineers and developers determine the vulnerability type and root cause of memory corruption bugs.” VulnScan works by producing reports like these.

Microsoft says  VulnScan is a tool designed and developed by MSRC to help security engineers and developers determine the vulnerability type and root cause of memory corruption bugs. It is built on top of two internally developed tools: Debugging Tools for Windows (WinDbg) and Time Travel Debugging (TTD).

Over a 10-month time frame where VulnScan was utilized to triage all memory defilement issues for Microsoft Edge, Microsoft Internet Explorer, and Microsoft Office items. It had a win rate around 85%, sparing an expected 500 hours of building time for MSRC engineers.

VulnScan
Source: Microsoft

Organizations and Developers can sign-up for the Microsoft Security Risk Detection service beta and test it for free before the service launches, most likely under a hefty paid subscription.

Back 2016 google launches a free Open source Fuzz testing tool OSS-Fuzz to make open source software more secure and stable.

Latest articles

Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems

A critical vulnerability has been discovered in Cisco's Nexus Dashboard Fabric Controller (NDFC), potentially...

Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new...

Tor Browser 13.5.6 Released – What’s New!

The Tor Project has announced the release of Tor Browser 13.5.6, which is now...

Mario Duarte, Former Snowflake Cybersecurity Leader, Joins Aembit as CISO to Tackle Non-Human Identities

Aembit, the non-human IAM company, today announced the appointment of Mario Duarte as chief...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...