cover of episode Bad Patches, Fuzzing Sockets, & 3DS Hacked by Super Mario

Bad Patches, Fuzzing Sockets, & 3DS Hacked by Super Mario

2021/4/27
logo of podcast Day[0]

Day[0]

Frequently requested episodes will be transcribed first

Shownotes Transcript

Some drama in the Linux Kernel and so many vulns resulting in code execution in Homebrew, GitLab, an air fryer, Source engine, Super Mario Maker, Adobe Reader and the Linux Kernel.

[00:00:32] On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits

[00:15:18] Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective

[00:22:30] [Ubuntu] OverlayFS LPE

[00:25:48] Synology DSM AppArmor synosearchagent misconfiguration

[00:28:22] [GitLab] RCE via unsafe inline Kramdown options

[00:35:25] [Homebrew] Broken parsing of Git diff allows an attacker to inject arbitrary Ruby scripts to Casks on official taps

[00:41:52] Remote code execution vulnerabilities in Cosori smart air fryer

[00:48:54] Source engine remote code execution via game invites [CVE-2021-30481]

[01:00:40] Discussion: Should programs be banned from Hackerone

[01:08:54] [Nintendo|3DS] Buffer Overflow in Super Mario Maker level decompression

[01:15:12] PrusaSlicer Obj.cpp load_obj() out-of-bounds write vulnerability

[01:20:12] Analysis of a use-after-free Vulnerability in Adobe Acrobat Reader DC

[01:31:21] Designing sockfuzzer, a network syscall fuzzer for XNU

[01:37:26] gaasedelen/tenet: A Trace Explorer for Reverse Engineers

[01:40:41] tmp.0ut

[01:44:35] Phœnix exploit / iOS 9.3.5

[01:46:02] Experiences with Apple Security Bounty

Watch the DAY[0] podcast live on Twitch (@dayzerosec)) every Monday afternoon at 12:00pm PST (3:00pm EST)

Or the vide