Day[0]

[binary] JS Type Confusions and Bringing Back Stack Attacks


Listen Later

In this episode, we discuss the discovery of a type confusion in Internet Explorer's JScript. We also explore a fun exploit strategy for a low-level memory management bug in the Linux kernel and delve into several issues in Huawei's Secure Monitor that enable code execution in the secure world.


Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/176.html


[00:00:00] Introduction

[00:00:30] Spot the Vuln - Update All The Things

[00:06:02] Type confusion in Internet Explorer's JScript9 engine [CVE-2022-41128]

[00:14:48] Exploiting CVE-2022-42703 - Bringing back the stack attack

[00:29:01] Huawei Secure Monitor Vulnerabilities


The DAY[0] Podcast episodes are streamed live on Twitch twice a week:

 -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities

 -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities  and exploits.


We are also available on the usual podcast platforms:

 -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063

 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt

 -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz

 -- Other audio platforms can be found at https://anchor.fm/dayzerosec


You can also join our discord: https://discord.gg/daTxTK9


...more
View all episodesView all episodes
Download on the App Store

Day[0]By dayzerosec

  • 4
  • 4
  • 4
  • 4
  • 4

4

10 ratings


More shows like Day[0]

View all
Critical Thinking - Bug Bounty Podcast by Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)

Critical Thinking - Bug Bounty Podcast

56 Listeners