Day[0] cover image

[binary] TOCTOUs in Intel SMM and Shannon Baseband Bugs

Day[0]

00:00

The DER Sequence Problem in G-Verify

A zero length OID can kind of control how far out of bounds you go as an attacker too so I thought that was a fun aspect of it. The second bug was again when trying to verify an SB NEGO token they would try to parse the context tag and get the number of bytes for the following DER sequence problem. As I mentioned earlier that buffer pointer is incremented to get past the size and get to the actual data but they never account for that increment in the current size. It could use an unsafe curse size cause they just didn't account for that pointer increment.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app