DiscoverDay[0][binary] A subtle iOS parsing bug and a PHP use-after-free
[binary] A subtle iOS parsing bug and a PHP use-after-free

[binary] A subtle iOS parsing bug and a PHP use-after-free

Update: 2022-04-14
Share

Description

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-subtle-ios-parsing-bug-and-a-php-use-after-free.html


We dive into an ASN.1 parsing bug impacting iOS, and a PHP use-after-free to bypass disabled functions, ending the week with a discussion about whether or not its too late to get into this area of security.


[00:00:29 ] Spot the Vuln - One HMAC at a Time


[00:03:19 ] CVE-2021-30737, @xerub's 2021 iOS ASN.1 Vulnerability


[00:19:03 ] In the land of PHP you will always be (use-after-)free


[00:30:13 ] security things in Linux v5.10


[00:36:16 ] Discussion: Is It too late to get into "cyber security"


The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:



  • Mondays at 3:00 pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities

  • Tuesdays at 7:00 pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.


The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec


You can also join our discord: https://discord.gg/daTxTK9


Or follow us on Twitter (@dayzerosec) to know when new releases are coming.

Comments 
In Channel
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

[binary] A subtle iOS parsing bug and a PHP use-after-free

[binary] A subtle iOS parsing bug and a PHP use-after-free

dayzerosec