Abdul-Aziz Hariri is a security researcher with the Zero Day Initiative program. In this role, Hariri analyzes and performs root-cause analysis on hundreds of vulnerabilities submitted to the Zero Day Initiative (ZDI) program, which is the world’s largest vendor-agnostic bug bounty program. His focus includes performing root-cause analysis, fuzzing and exploit development.
Prior to joining ZDI, Hariri worked as an independent security researcher and threat analyst for Morgan Stanley emergency response team. During his time as an independent researcher, he was profiled by Wired magazine in their 2012 article, Portrait of a Full-Time Bug Hunter. In 2015, Abdul was part of the research team that submitted “Breaking Silent Mitigations – Gaining code execution on Isolated Heap and MemoryProtection hardened Internet Explorer” to the Microsoft bounty program. Their submission netted the highest payout to date from the Microsoft bounty program where the proceeds went to many STEM organizations. Twitter: @abdhariri
Breaking VMWare’s Virtual Printing
The inclusion of 3rd party components into large applications has become a common practice in modern software. Vendors would obviously benefit from the features they get without the need to invest costly engineering effort. However, leveraging 3rd party components for a quick functionality boost comes with security side effects that might not be understood by the vendor until it is too late. That’s exactly what happened with VMWare’s Virtual Printing.
Recently, in the ZDI, we started seeing an increase in VMWare submissions. These submissions were targeting VMWare’s Virtual Printing feature. This feature is based on a software component from ThinkPrint. Through out this presentation, we will be explaining how Virtual Printing works. We will also cover how the bugs that we received through our program were found. Finally, we’ll be explaining a faster way to fuzz and find bugs in VMWare’s virtual printing feature.