[binary] Allocator MTE, libwebp, and Operation Triangulation

Day[0] - A podcast by dayzerosec

Categories:

This week's highly technical episode has discussion around the exploitation of a libwebp vulnerability we covered previously, memory tagging (MTE) implementation with common allocators, and an insane iPhone exploit chain that targeted researchers. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/234.html [00:00:00] Introduction [00:02:35] PagedOut Issue 3 [00:05:14] GPSd NTRIP Stream Parsing access violation vulnerability [00:08:25] Exploiting the libwebp Vulnerability, Part 1: Playing with Huffman Code [00:30:01] Strengthening the Shield: MTE in Heap Allocators [00:37:40] Operation Triangulation - What you get when you attack iPhones of Researchers The DAY[0] Podcast episodes are streamed live on Twitch twice a week: -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits. We are also available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9