Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Here we go again.

Here we go again.

Scheduled Pinned Locked Moved Uncategorized
13 Posts 7 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • langerjan@chaos.socialL langerjan@chaos.social

    @bagder How about reporters pay 1€ and they get 1€ back and some stickers if the report has some merit?

    bagder@mastodon.socialB This user is from outside of this forum
    bagder@mastodon.socialB This user is from outside of this forum
    bagder@mastodon.social
    wrote last edited by
    #3

    @LangerJan once you have build the site and infra to handle that, we can consider it 😃

    langerjan@chaos.socialL breakin@mastodon.gamedev.placeB suihkulokki@society.oftrolls.comS 3 Replies Last reply
    0
    • bagder@mastodon.socialB bagder@mastodon.social

      @LangerJan once you have build the site and infra to handle that, we can consider it 😃

      langerjan@chaos.socialL This user is from outside of this forum
      langerjan@chaos.socialL This user is from outside of this forum
      langerjan@chaos.social
      wrote last edited by
      #4

      @bagder I would call it the "slop-jar". Pay into the slop-jar, and if we deem your report to be slop, your money stays in.

      langerjan@chaos.socialL 1 Reply Last reply
      0
      • bagder@mastodon.socialB bagder@mastodon.social

        @LangerJan once you have build the site and infra to handle that, we can consider it 😃

        breakin@mastodon.gamedev.placeB This user is from outside of this forum
        breakin@mastodon.gamedev.placeB This user is from outside of this forum
        breakin@mastodon.gamedev.place
        wrote last edited by
        #5

        @bagder @LangerJan I was more thinking that you need to not only provide a "fix" but also some sort of code that exploits the vulnerability. Something that is like that you are running in a sandbox and you need to break out of it and do something to prove that the exploit works. So if you could setup a challenge and when you get a "report" you run it and only if it passed the challenge you cared about it.

        breakin@mastodon.gamedev.placeB 1 Reply Last reply
        0
        • breakin@mastodon.gamedev.placeB breakin@mastodon.gamedev.place

          @bagder @LangerJan I was more thinking that you need to not only provide a "fix" but also some sort of code that exploits the vulnerability. Something that is like that you are running in a sandbox and you need to break out of it and do something to prove that the exploit works. So if you could setup a challenge and when you get a "report" you run it and only if it passed the challenge you cared about it.

          breakin@mastodon.gamedev.placeB This user is from outside of this forum
          breakin@mastodon.gamedev.placeB This user is from outside of this forum
          breakin@mastodon.gamedev.place
          wrote last edited by
          #6

          @bagder @LangerJan This also requires infra to handle it but then at least you could programmatically ignore reports and the AIs can battle it out and try to break the sandbox.

          1 Reply Last reply
          0
          • langerjan@chaos.socialL langerjan@chaos.social

            @bagder I would call it the "slop-jar". Pay into the slop-jar, and if we deem your report to be slop, your money stays in.

            langerjan@chaos.socialL This user is from outside of this forum
            langerjan@chaos.socialL This user is from outside of this forum
            langerjan@chaos.social
            wrote last edited by
            #7

            @bagder omg, I googled "slop jar" 😆 This is becoming a thing, one way or another.

            1 Reply Last reply
            0
            • bagder@mastodon.socialB bagder@mastodon.social

              Here we go again.

              "The fact that the poc code does not work, we cannot reproduce, the bullet point list in the end and the mixed case in the title, all seem to indicate that this was hallucinated.

              I would suggest you make a strong attempt to convince us this was not just wasting our time with AI crap because we have just about made up our minds already."

              bagder@mastodon.socialB This user is from outside of this forum
              bagder@mastodon.socialB This user is from outside of this forum
              bagder@mastodon.social
              wrote last edited by
              #8

              Link Preview Image
              curl disclosed on HackerOne: Curl Telnet Handler Buffer Overflow

              ## Summary: I found a buffer overflow in curl's telnet protocol handler that allows remote memory corruption without authentication. The bug is in the CURL_SB_ACCUM macro in lib/telnet.c line 69, where the bounds check lets you write one byte past the end of a 512-byte buffer. When curl receives 512+ bytes in a telnet suboption, it overflows into adjacent memory and corrupts the telnet state...

              favicon

              HackerOne (hackerone.com)

              privateger@plasmatrap.comP winni@s.pebcak.deW harrysintonen@infosec.exchangeH 3 Replies Last reply
              0
              • bagder@mastodon.socialB bagder@mastodon.social

                Link Preview Image
                curl disclosed on HackerOne: Curl Telnet Handler Buffer Overflow

                ## Summary: I found a buffer overflow in curl's telnet protocol handler that allows remote memory corruption without authentication. The bug is in the CURL_SB_ACCUM macro in lib/telnet.c line 69, where the bounds check lets you write one byte past the end of a 512-byte buffer. When curl receives 512+ bytes in a telnet suboption, it overflows into adjacent memory and corrupts the telnet state...

                favicon

                HackerOne (hackerone.com)

                privateger@plasmatrap.comP This user is from outside of this forum
                privateger@plasmatrap.comP This user is from outside of this forum
                privateger@plasmatrap.com
                wrote last edited by
                #9

                @bagder@mastodon.social what even drives someone to report trash so often

                bagder@mastodon.socialB 1 Reply Last reply
                0
                • privateger@plasmatrap.comP privateger@plasmatrap.com

                  @bagder@mastodon.social what even drives someone to report trash so often

                  bagder@mastodon.socialB This user is from outside of this forum
                  bagder@mastodon.socialB This user is from outside of this forum
                  bagder@mastodon.social
                  wrote last edited by
                  #10

                  @privateger I can't understand humans!

                  1 Reply Last reply
                  0
                  • bagder@mastodon.socialB bagder@mastodon.social

                    @LangerJan once you have build the site and infra to handle that, we can consider it 😃

                    suihkulokki@society.oftrolls.comS This user is from outside of this forum
                    suihkulokki@society.oftrolls.comS This user is from outside of this forum
                    suihkulokki@society.oftrolls.com
                    wrote last edited by
                    #11

                    @bagder @LangerJan A CLAUDE.md file telling agent contributors pass 5€ Into a Paypal account before submit a PR or hackerone report.

                    1 Reply Last reply
                    0
                    • bagder@mastodon.socialB bagder@mastodon.social

                      Link Preview Image
                      curl disclosed on HackerOne: Curl Telnet Handler Buffer Overflow

                      ## Summary: I found a buffer overflow in curl's telnet protocol handler that allows remote memory corruption without authentication. The bug is in the CURL_SB_ACCUM macro in lib/telnet.c line 69, where the bounds check lets you write one byte past the end of a 512-byte buffer. When curl receives 512+ bytes in a telnet suboption, it overflows into adjacent memory and corrupts the telnet state...

                      favicon

                      HackerOne (hackerone.com)

                      winni@s.pebcak.deW This user is from outside of this forum
                      winni@s.pebcak.deW This user is from outside of this forum
                      winni@s.pebcak.de
                      wrote last edited by
                      #12

                      @bagder "definitive_proof.py" - right, because that's how humans would call the script.

                      1 Reply Last reply
                      0
                      • bagder@mastodon.socialB bagder@mastodon.social

                        Link Preview Image
                        curl disclosed on HackerOne: Curl Telnet Handler Buffer Overflow

                        ## Summary: I found a buffer overflow in curl's telnet protocol handler that allows remote memory corruption without authentication. The bug is in the CURL_SB_ACCUM macro in lib/telnet.c line 69, where the bounds check lets you write one byte past the end of a 512-byte buffer. When curl receives 512+ bytes in a telnet suboption, it overflows into adjacent memory and corrupts the telnet state...

                        favicon

                        HackerOne (hackerone.com)

                        harrysintonen@infosec.exchangeH This user is from outside of this forum
                        harrysintonen@infosec.exchangeH This user is from outside of this forum
                        harrysintonen@infosec.exchange
                        wrote last edited by
                        #13

                        @bagder "the hanging proves memory corruption." 🤦‍♂️

                        1 Reply Last reply
                        1
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups