Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 The trick to powerful public speaking | Lawrence Bernstein 17:27
[binary] Samsung Baseband and GPU Vulns
Manage episode 387987870 series 2606557
A Samsung special this week, starting off with two Samsung specific vulnerabilities, one in the baseband chip for code execution. And a stack based overflow in the RILD service handler parsing IPC calls from the baseband chip for a denial of service. Lastly a Mali GPU driver use-after-free. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/230.html [00:00:00] Introduction [00:00:27] Humble Tech Book Bundle: Hacking 2023 by No Starch [00:08:15] CVE-2023-21517: Samsung Baseband LTE ESM TFT Heap Buffer Overflow [00:18:10] CVE-2023-30644: Samsung RIL Stack Buffer Overflow [00:24:58] Arm Mali r44p0: UAF by freeing waitqueue with elements on it [00:31:55] A Detailed Look at Pwn2Own Automotive EV Charger Hardware The DAY[0] Podcast episodes are streamed live on Twitch twice a week: -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits. We are also available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9
282 episodes
Manage episode 387987870 series 2606557
A Samsung special this week, starting off with two Samsung specific vulnerabilities, one in the baseband chip for code execution. And a stack based overflow in the RILD service handler parsing IPC calls from the baseband chip for a denial of service. Lastly a Mali GPU driver use-after-free. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/230.html [00:00:00] Introduction [00:00:27] Humble Tech Book Bundle: Hacking 2023 by No Starch [00:08:15] CVE-2023-21517: Samsung Baseband LTE ESM TFT Heap Buffer Overflow [00:18:10] CVE-2023-30644: Samsung RIL Stack Buffer Overflow [00:24:58] Arm Mali r44p0: UAF by freeing waitqueue with elements on it [00:31:55] A Detailed Look at Pwn2Own Automotive EV Charger Hardware The DAY[0] Podcast episodes are streamed live on Twitch twice a week: -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits. We are also available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9
282 episodes
All episodes
×![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Mitigating Browser Hacking - Interview with John Carse (SquareX Field CISO) 1:46:57
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Pulling Gemini Secrets and Windows HVPT 1:33:22
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Session-ception and User Namespaces Strike Again 49:36
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Extracting YouTube Creator Emails and Spilling Azure Secrets 44:04
![Day[0] podcast artwork](/static/images/64pixel.png)
1 ESP32 Backdoor Drama and SAML Auth Bypasses 1:14:08
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Exploiting Xbox 360 Hypervisor and Microcode Hacking 1:19:05
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Path Confusion and Mixing Public/Private Keys 59:34
![Day[0] podcast artwork](/static/images/64pixel.png)
1 ZDI's Triaging Troubles and LibreOffice Exploits 57:02
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Recycling Exploits in MacOS and Pirating Audiobooks 1:17:06
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Top 10 Web Hacking Techniques and Windows Shadow Stacks 1:12:42
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Unicode Troubles, Bypassing CFG, and Racey Pointer Updates 41:29
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Deanonymization with CloudFlare and Subaru's Security Woes 1:07:35
![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.