Tavis Ormandy | |
---|---|
Occupation | Hacker |
Tavis Ormandy is an English computer security white hat hacker. He is currently employed by Google and was formerly part of Google's Project Zero team. [1]
Ormandy is credited with discovering severe vulnerabilities in LibTIFF, [2] Sophos' antivirus software [3] and Microsoft Windows. [4] With Natalie Silvanovich he discovered a severe vulnerability in FireEye products in 2015. [5]
His findings with Sophos' products led him to write a 30-page paper entitled "Sophail: Applied attacks against Sophos Antivirus" in 2012, which concludes that the company was "working with good intentions" but is "ill-equipped to handle the output of one co-operative security researcher working in his spare time" and that its products shouldn't be used on high-value systems. [6]
He also created an exploit in 2014 to demonstrate how a vulnerability in glibc known since 2005 could be used to gain root access on an affected machine running a 32-bit version of Fedora. [7]
In 2016, he demonstrated multiple vulnerabilities in Trend Micro Antivirus on Windows related to the Password Manager, [8] and vulnerabilities in Symantec security products.
In February 2017, he found and reported a critical bug in Cloudflare's infrastructure leaking user-sensitive data along with requests affecting millions of websites around the world which has been referred to as Cloudbleed (in reference to the Heartbleed bug that Google co-discovered). [9]
On or around May 15, 2023, he found and reported a vulnerability called Zenbleed (CVE-2023-20593) affecting all Zen 2 class processors.
In September 2024, he was involved in discovering a microcode vulnerability affecting certain AMD Zen based processors. [10] [11] [12] (CVE-2024-56161)