Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Here we go again.

Here we go again.

Scheduled Pinned Locked Moved Uncategorized
13 Posts 7 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • bagder@mastodon.socialB bagder@mastodon.social

    Here we go again.

    "The fact that the poc code does not work, we cannot reproduce, the bullet point list in the end and the mixed case in the title, all seem to indicate that this was hallucinated.

    I would suggest you make a strong attempt to convince us this was not just wasting our time with AI crap because we have just about made up our minds already."

    langerjan@chaos.socialL This user is from outside of this forum
    langerjan@chaos.socialL This user is from outside of this forum
    langerjan@chaos.social
    wrote last edited by
    #2

    @bagder How about reporters pay 1€ and they get 1€ back and some stickers if the report has some merit?

    bagder@mastodon.socialB 1 Reply Last reply
    0
    • langerjan@chaos.socialL langerjan@chaos.social

      @bagder How about reporters pay 1€ and they get 1€ back and some stickers if the report has some merit?

      bagder@mastodon.socialB This user is from outside of this forum
      bagder@mastodon.socialB This user is from outside of this forum
      bagder@mastodon.social
      wrote last edited by
      #3

      @LangerJan once you have build the site and infra to handle that, we can consider it 😃

      langerjan@chaos.socialL breakin@mastodon.gamedev.placeB suihkulokki@society.oftrolls.comS 3 Replies Last reply
      0
      • bagder@mastodon.socialB bagder@mastodon.social

        @LangerJan once you have build the site and infra to handle that, we can consider it 😃

        langerjan@chaos.socialL This user is from outside of this forum
        langerjan@chaos.socialL This user is from outside of this forum
        langerjan@chaos.social
        wrote last edited by
        #4

        @bagder I would call it the "slop-jar". Pay into the slop-jar, and if we deem your report to be slop, your money stays in.

        langerjan@chaos.socialL 1 Reply Last reply
        0
        • bagder@mastodon.socialB bagder@mastodon.social

          @LangerJan once you have build the site and infra to handle that, we can consider it 😃

          breakin@mastodon.gamedev.placeB This user is from outside of this forum
          breakin@mastodon.gamedev.placeB This user is from outside of this forum
          breakin@mastodon.gamedev.place
          wrote last edited by
          #5

          @bagder @LangerJan I was more thinking that you need to not only provide a "fix" but also some sort of code that exploits the vulnerability. Something that is like that you are running in a sandbox and you need to break out of it and do something to prove that the exploit works. So if you could setup a challenge and when you get a "report" you run it and only if it passed the challenge you cared about it.

          breakin@mastodon.gamedev.placeB 1 Reply Last reply
          0
          • breakin@mastodon.gamedev.placeB breakin@mastodon.gamedev.place

            @bagder @LangerJan I was more thinking that you need to not only provide a "fix" but also some sort of code that exploits the vulnerability. Something that is like that you are running in a sandbox and you need to break out of it and do something to prove that the exploit works. So if you could setup a challenge and when you get a "report" you run it and only if it passed the challenge you cared about it.

            breakin@mastodon.gamedev.placeB This user is from outside of this forum
            breakin@mastodon.gamedev.placeB This user is from outside of this forum
            breakin@mastodon.gamedev.place
            wrote last edited by
            #6

            @bagder @LangerJan This also requires infra to handle it but then at least you could programmatically ignore reports and the AIs can battle it out and try to break the sandbox.

            1 Reply Last reply
            0
            • langerjan@chaos.socialL langerjan@chaos.social

              @bagder I would call it the "slop-jar". Pay into the slop-jar, and if we deem your report to be slop, your money stays in.

              langerjan@chaos.socialL This user is from outside of this forum
              langerjan@chaos.socialL This user is from outside of this forum
              langerjan@chaos.social
              wrote last edited by
              #7

              @bagder omg, I googled "slop jar" 😆 This is becoming a thing, one way or another.

              1 Reply Last reply
              0
              • bagder@mastodon.socialB bagder@mastodon.social

                Here we go again.

                "The fact that the poc code does not work, we cannot reproduce, the bullet point list in the end and the mixed case in the title, all seem to indicate that this was hallucinated.

                I would suggest you make a strong attempt to convince us this was not just wasting our time with AI crap because we have just about made up our minds already."

                bagder@mastodon.socialB This user is from outside of this forum
                bagder@mastodon.socialB This user is from outside of this forum
                bagder@mastodon.social
                wrote last edited by
                #8

                Link Preview Image
                curl disclosed on HackerOne: Curl Telnet Handler Buffer Overflow

                ## Summary: I found a buffer overflow in curl's telnet protocol handler that allows remote memory corruption without authentication. The bug is in the CURL_SB_ACCUM macro in lib/telnet.c line 69, where the bounds check lets you write one byte past the end of a 512-byte buffer. When curl receives 512+ bytes in a telnet suboption, it overflows into adjacent memory and corrupts the telnet state...

                favicon

                HackerOne (hackerone.com)

                privateger@plasmatrap.comP winni@s.pebcak.deW harrysintonen@infosec.exchangeH 3 Replies Last reply
                0
                • bagder@mastodon.socialB bagder@mastodon.social

                  Link Preview Image
                  curl disclosed on HackerOne: Curl Telnet Handler Buffer Overflow

                  ## Summary: I found a buffer overflow in curl's telnet protocol handler that allows remote memory corruption without authentication. The bug is in the CURL_SB_ACCUM macro in lib/telnet.c line 69, where the bounds check lets you write one byte past the end of a 512-byte buffer. When curl receives 512+ bytes in a telnet suboption, it overflows into adjacent memory and corrupts the telnet state...

                  favicon

                  HackerOne (hackerone.com)

                  privateger@plasmatrap.comP This user is from outside of this forum
                  privateger@plasmatrap.comP This user is from outside of this forum
                  privateger@plasmatrap.com
                  wrote last edited by
                  #9

                  @bagder@mastodon.social what even drives someone to report trash so often

                  bagder@mastodon.socialB 1 Reply Last reply
                  0
                  • privateger@plasmatrap.comP privateger@plasmatrap.com

                    @bagder@mastodon.social what even drives someone to report trash so often

                    bagder@mastodon.socialB This user is from outside of this forum
                    bagder@mastodon.socialB This user is from outside of this forum
                    bagder@mastodon.social
                    wrote last edited by
                    #10

                    @privateger I can't understand humans!

                    1 Reply Last reply
                    0
                    • bagder@mastodon.socialB bagder@mastodon.social

                      @LangerJan once you have build the site and infra to handle that, we can consider it 😃

                      suihkulokki@society.oftrolls.comS This user is from outside of this forum
                      suihkulokki@society.oftrolls.comS This user is from outside of this forum
                      suihkulokki@society.oftrolls.com
                      wrote last edited by
                      #11

                      @bagder @LangerJan A CLAUDE.md file telling agent contributors pass 5€ Into a Paypal account before submit a PR or hackerone report.

                      1 Reply Last reply
                      0
                      • bagder@mastodon.socialB bagder@mastodon.social

                        Link Preview Image
                        curl disclosed on HackerOne: Curl Telnet Handler Buffer Overflow

                        ## Summary: I found a buffer overflow in curl's telnet protocol handler that allows remote memory corruption without authentication. The bug is in the CURL_SB_ACCUM macro in lib/telnet.c line 69, where the bounds check lets you write one byte past the end of a 512-byte buffer. When curl receives 512+ bytes in a telnet suboption, it overflows into adjacent memory and corrupts the telnet state...

                        favicon

                        HackerOne (hackerone.com)

                        winni@s.pebcak.deW This user is from outside of this forum
                        winni@s.pebcak.deW This user is from outside of this forum
                        winni@s.pebcak.de
                        wrote last edited by
                        #12

                        @bagder "definitive_proof.py" - right, because that's how humans would call the script.

                        1 Reply Last reply
                        0
                        • bagder@mastodon.socialB bagder@mastodon.social

                          Link Preview Image
                          curl disclosed on HackerOne: Curl Telnet Handler Buffer Overflow

                          ## Summary: I found a buffer overflow in curl's telnet protocol handler that allows remote memory corruption without authentication. The bug is in the CURL_SB_ACCUM macro in lib/telnet.c line 69, where the bounds check lets you write one byte past the end of a 512-byte buffer. When curl receives 512+ bytes in a telnet suboption, it overflows into adjacent memory and corrupts the telnet state...

                          favicon

                          HackerOne (hackerone.com)

                          harrysintonen@infosec.exchangeH This user is from outside of this forum
                          harrysintonen@infosec.exchangeH This user is from outside of this forum
                          harrysintonen@infosec.exchange
                          wrote last edited by
                          #13

                          @bagder "the hanging proves memory corruption." 🤦‍♂️

                          1 Reply Last reply
                          1
                          0
                          • R relay@relay.infosec.exchange shared this topic
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups