A New AMD sidechannel, and an old intel CSME attack, a couple deserialization attacks, and a few clever but not terribly useful attacks, and some discussion about memory tagging on this weeks episode of DAY[0].
[00:00:21] Election Security 2020: Don't Let Disinformation Undermine Your Right to Vote)
[00:06:52] Announcing Remote Participation in Pwn2Own Vancouver)
[00:11:22] Revoking certain certificates on March 4)
[00:19:40] FuzzBench: Fuzzer Benchmarking as a Service)
[00:28:53] Intel x86 Root of Trust: loss of trust )
[00:39:07] Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors)
[00:49:11] VU#782301 - pppd vulnerable to buffer overflow due to a flaw in EAP packet processing)
https://github.com/paulusmack/ppp/commit/8d45443bb5c9372b4c6a362ba2f443d41c5636af)
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426)
[00:55:11] MediaTek rootkit affecting millions of Android devices)
[01:01:56] Zoho ManageEngine RCE)
[01:11:25] RCE Through a Deserialization Bug in Oracle's WebLogic Server (CVE-2020-2555))
[01:14:22] Regex Vulnerabilities - parse-community/parse-server)
[01:18:57] HTTP request smuggling using malformed Transfer-Encoding header)
[01:27:20] [Nextcloud] Delete All Data of Any User)
[01:30:36] Dismantling DST80-based Immobiliser Systems)
[01:37:53] Exploring Backdoor Poisoning Attacks Against Malware Classifiers)
[01:45:59] Code Renewability for Native Software Protection)
[01:55:42] Security Analysis of Memory Tagging)
[02:04:15] DangKiller: Eliminating Dangling Pointers Efficiently via Implicit Identifier)
Watch the DAY[0] podcast live on Twitch (@dayzerosec)) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0]))