ping Vulnerability Patch Analysis (with #ChatGPT) - CVE-2022-23093





Shop (advertisement): https://shop.liveoverflow.com/

Using ChatGPT we try to analyse the ping vulnerability known as CVE-2022-23093. Can we figure out how the bug is triggered?

→ Twitch Subscription: https://www.twitch.tv/products/liveov...
→ per Video: https://www.patreon.com/join/liveover...
→ per Month: https://www.youtube.com/channel/UClcE...

CVE-2022-23093 Advisory: https://www.freebsd.org/security/advi...

Chapters:
00:00 - ping CVE-2022-23093 Introduction
00:34 - Reading Advisory
02:11 - Patch Analysis with ChatGPT
03:40 - Talking About ping Threat Model
05:15 - Reading (First) Bad Patch Explanation
06:50 - Understanding The IP Header
08:31 - Missing a Potential Overflow
10:22 - ping Response Packet Structure?
15:55 - What is oip_header_length?
19:07 - How Does Ping Work?
20:37 - Discovering Buffer Overflow
23:35 - The Fix
28:05 - ping Vulnerability Summary
31:00 - Exploitability Investigation with ChatGPT
37:25 - Outro

=[ 📄 Info. ]=

Main Channel: https://youtube.com/LiveOverflowCTF
Twitch: https://twitch.tv/LiveOverflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

=[ 📄 P.S. ]=

#liveoverflow


IGNORE TAGS #hacking,#infosec,#tutorial,#bugbounty,#threat,#hunting,#pentest,#hacked,#ethical,#hacker,#cyber,#learn,#security,#computer,#pc,#news

Comments