Jan. 26, 2023, 1 a.m. | DAY[0]

DAY[0] www.youtube.com

Null-dereferences might not be too exploitable on a lot of systems, what about the handling of a null-dereference. We cover a great Project Zero post on the topic, then look at a type confusion in Windows COM, a Nintendo buffer overflow, and several memory corruptions in git, highlighting their unique primitives and potential exploitability.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/182.html

[00:00:00] Introduction
[00:01:14] Spot the Vuln - Resolution
[00:03:38] Exploiting null-dereferences in the Linux kernel …

binary binary exploitation buffer buffer overflow exploitation exploiting fusion git great handling introduction linux memory nintendo overflow podcast project project zero resolution systems type confusion vuln windows

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC