101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

508
active users

#186f495d4be1

0 posts0 participants0 posts today
Tod Beardsley<p>All right <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> mastodon. How do I find out who is talking about a particular fresh vuln? I’m going to throw out some hashtags and see what turns up relevant conversation.</p><p><a href="https://infosec.exchange/tags/186f495d4be1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>186f495d4be1</span></a><br><a href="https://infosec.exchange/tags/cve_2022_23093" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve_2022_23093</span></a><br><a href="https://infosec.exchange/tags/pingbof" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pingbof</span></a><br><a href="https://infosec.exchange/tags/pr_pack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pr_pack</span></a></p><p>Is this a big deal because stack based <a href="https://infosec.exchange/tags/bof" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bof</span></a> in a common <a href="https://infosec.exchange/tags/setuid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>setuid</span></a> binary, or a <a href="https://infosec.exchange/tags/shrug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shrug</span></a> because <a href="https://infosec.exchange/tags/ping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ping</span></a> is capability restricted in <a href="https://infosec.exchange/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a>?</p><p><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-22:15.ping.asc" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">freebsd.org/security/advisorie</span><span class="invisible">s/FreeBSD-SA-22:15.ping.asc</span></a></p>
pirate moo 🐮<p>freebsd.org/security/advisories/FreeBSD-SA-22:15.ping.asc </p><p>I don't get why people laughed at this CVE (2022-23093). </p><p>I initially misread it and took it for a DoS. </p><p>I assume an ICMP fragmentation attack could actually DoS it as well (am I wrong here? tell me why), but this actually could RCE from what I understand. </p><p>Am I missing something?</p><p></p>