Bad Patches, Fuzzing Sockets, & 3DS Hacked by Super Mario

Published: April 27, 2021, 10 p.m.

Some drama in the Linux Kernel and so many vulns resulting in code execution in Homebrew, GitLab, an air fryer, Source engine, Super Mario Maker, Adobe Reader and the Linux Kernel.

\n

[00:00:32] On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits
\n

\n
    \n
  • https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf
  • \n
  • https://lore.kernel.org/linux-nfs/YH+zwQgBBGUJdiVK@unreal/
  • \n
  • https://lore.kernel.org/linux-nfs/YH%2FfM%2FTsbmcZzwnX@kroah.com/
  • \n
  • During this episode we speculated that the recent patches might be unrelated to the research. This seems to have been confirmed by U. Mn in an email we did not see before recording 
  • \n
  • https://lore.kernel.org/lkml/CAK8KejpUVLxmqp026JY7x5GzHU2YJLPU8SzTZUNXU2OXC70ZQQ@mail.gmail.com/
  • \n
\n

[00:15:18] Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective
\n

\n
    \n
  • https://signal.org/blog/cellebrite-vulnerabilities/
  • \n
\n

[00:22:30] [Ubuntu] OverlayFS LPE
\n

\n
    \n
  • https://ssd-disclosure.com/ssd-advisory-overlayfs-pe/
  • \n
\n

[00:25:48] Synology DSM AppArmor synosearchagent misconfiguration
\n

\n
    \n
  • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1158
  • \n
\n

[00:28:22] [GitLab] RCE via unsafe inline Kramdown options
\n

\n
    \n
  • https://hackerone.com/reports/1125425
  • \n
\n

[00:35:25] [Homebrew] Broken parsing of Git diff allows an attacker to inject arbitrary Ruby scripts to Casks on official taps
\n

\n
    \n
  • https://hackerone.com/reports/1167608
  • \n
  • https://blog.ryotak.me/post/homebrew-security-incident-en/
  • \n
\n

[00:41:52] Remote code execution vulnerabilities in Cosori smart air fryer
\n

\n
    \n
  • https://blog.talosintelligence.com/2021/04/vuln-spotlight-co.html
  • \n
  • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1217
  • \n
  • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1216
  • \n
\n

[00:48:54] Source engine remote code execution via game invites [CVE-2021-30481]
\n

\n
    \n
  • https://secret.club/2021/04/20/source-engine-rce-invite.html
  • \n
\n

[01:00:40] Discussion: Should programs be banned from Hackerone
\n

\n
    \n
  • https://dayzerosec.com
  • \n
\n

[01:08:54] [Nintendo|3DS] Buffer Overflow in Super Mario Maker level decompression
\n

\n
    \n
  • https://hackerone.com/reports/687887
  • \n
\n

[01:15:12] PrusaSlicer Obj.cpp load_obj() out-of-bounds write vulnerability
\n

\n
    \n
  • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1219
  • \n
\n

[01:20:12] Analysis of a use-after-free Vulnerability in Adobe Acrobat Reader DC
\n

\n
    \n
  • https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/
  • \n
  • https://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem
  • \n
\n

[01:31:21] Designing sockfuzzer, a network syscall fuzzer for XNU
\n

\n
    \n
  • https://googleprojectzero.blogspot.com/2021/04/designing-sockfuzzer-network-syscall.html
  • \n
\n

[01:37:26] gaasedelen/tenet: A Trace Explorer for Reverse Engineers
\n

\n
    \n
  • https://github.com/gaasedelen/tenet
  • \n
\n

[01:40:41] tmp.0ut
\n

\n
    \n
  • https://tmpout.sh/1/
  • \n
\n

[01:44:35] Ph\u0153nix exploit / iOS 9.3.5
\n

\n
    \n
  • https://gist.github.com/Siguza/96ae6d6806e974199b1d44ffffca5331
  • \n
\n

[01:46:02] Experiences with Apple Security Bounty
\n

\n
    \n
  • https://theevilbit.github.io/posts/experiences_with_asb/
  • \n
\n

Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)

\n

Or the vide