[binary] JS Type Confusions and Bringing Back Stack Attacks

Day[0] - Un pódcast de dayzerosec

Categorías:

In this episode, we discuss the discovery of a type confusion in Internet Explorer's JScript. We also explore a fun exploit strategy for a low-level memory management bug in the Linux kernel and delve into several issues in Huawei's Secure Monitor that enable code execution in the secure world. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/176.html [00:00:00] Introduction [00:00:30] Spot the Vuln - Update All The Things [00:06:02] Type confusion in Internet Explorer's JScript9 engine [CVE-2022-41128] [00:14:48] Exploiting CVE-2022-42703 - Bringing back the stack attack [00:29:01] Huawei Secure Monitor Vulnerabilities The DAY[0] Podcast episodes are streamed live on Twitch twice a week:  -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities  -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities  and exploits. We are also available on the usual podcast platforms:  -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063  -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt  -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz  -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9

Visit the podcast's native language site