WebKit Bugs, a Windows Race, and House of IO Improved [Exploit Dev/VR]

Published: Oct. 21, 2021, midnight

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/webkit-bugs-a-windows-race-and-house-of-io-improved.html

\n

Tianfu Cup happened this week, we also got some cool windows and webkit issues, along side an improvment to the House of IO attack

\n

[00:00:17] Spot The Vuln - Prepare To Inject - Solution

\n

[00:03:14] Tianfu Cup 2021

\n

[00:09:10] Six Privilege Escalations and an Info Leak in Windows [Blackswan vulnerabilities]

\n

[00:25:16] nt!ObpCreateSymbolicLinkName Race Condition Write-Beyond-Boundary

\n

[00:31:37] CVE-2021-30858: Use-after-free in WebKit

\n

[00:44:53] WebKit: heap-use-after-free in DOMWindow::open

\n

[00:50:23] House of IO - Heap Reuse

\n

[01:02:06] Getting started in macOS security

\n

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

\n

    \n\t
  • Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
  • \n\t
  • Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
  • \n
\n

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

\n

You can also join our discord: https://discord.gg/daTxTK9

\n

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.