cover of episode [binary] A subtle iOS parsing bug and a PHP use-after-free

[binary] A subtle iOS parsing bug and a PHP use-after-free

2022/4/14
logo of podcast Day[0]

Day[0]

Shownotes Transcript

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-subtle-ios-parsing-bug-and-a-php-use-after-free.html

We dive into an ASN.1 parsing bug impacting iOS, and a PHP use-after-free to bypass disabled functions, ending the week with a discussion about whether or not its too late to get into this area of security.

[00:00:29] Spot the Vuln - One HMAC at a Time

[00:03:19] CVE-2021-30737, @xerub's 2021 iOS ASN.1 Vulnerability

[00:19:03] In the land of PHP you will always be (use-after-)free

[00:30:13] security things in Linux v5.10

[00:36:16] Discussion: Is It too late to get into "cyber security"

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities

- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

You can also join our discord: https://discord.gg/daTxTK9

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.