Escaping the Bhyve, WhatsApp, & BrakTooth [Binary Exploitation]

Published: Sept. 9, 2021, midnight

b'

A tricky to exploit WhatsApp vulnerability, but still an interesting bug, several Bhyve vulnerabilities, and a named bluetooth vuln (Braktooth)

\\n

Links and summaries are available on our website: https://dayzerosec.com/podcast/escaping-the-bhyve-whatsapp-braktooth.html

\\n

[00:00:00] Introduction + The Future
\\n[00:02:08] Spot The Vuln Solution
\\n[00:07:25] Replay-based attack on Honda and Acura vehicles
\\n[00:15:54] A Heap-based Buffer Overflow Bug in the MySQL InnoDB memcached Plugin [CVE-2021-2429]
\\n[00:25:44] Vulnerability in WhatsApp could have led to data exposure of users
\\n[00:32:26] Code execution outside the virtualized guest in bhyve [CVE-2021-29631]
\\n[00:40:59] Your vulnerability is in another OEM!
\\n[01:01:36] BrakTooth
\\n[01:09:00] HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs
\\n

\\n

The DAY[0] Podcast has two weekly episodes that are streamed live on Twitch (https://www.twitch.tv/dayzerosec)

\\n

Mondays at 3pm Eastern we focus on vulnerabilities that would be of interest to bounty hunters, and on Tuesdays at 7:00pm Eastern we focus on low-level vulnerabilities.

\\n

You can also join our discord: https://discord.gg/daTxTK9 Or follow us on Twitter (@dayzerosec) to know when new releases are coming.

'