Xion (@0x10n) 's Twitter Profile
Xion

@0x10n

CMU CSD PhD student / 2024 Top#0 Chrome VRP Researcher / Winner of Pwn2Own Vancouver '24, TyphoonPWN '24, DEFCON 31 CTF, ... / PPP, KAIST GoN '18, @zer0pts

ID: 1298620596406743040

linkhttps://github.com/leesh3288 calendar_today26-08-2020 13:57:42

359 Tweet

3,3K Followers

122 Following

xvonfers (@xvonfers) 's Twitter Profile Photo

(CVE-2024-6779)[351327767][wasm][multi-memory]Wasm OOB memory access due to cached memory index confusion with multi-memory is now open with PoCs and exploit issues.chromium.org/issues/3513277… Xion P.S. I thank Seunghyun Lee for the analysis and recommend reading his great writeup.

Xion (@0x10n) 's Twitter Profile Photo

Uploaded my slides from POC2024. I'll soon be giving a slightly shorter version of the same talk on CODE BLUE 2024 too. github.com/leesh3288/talk…

xvonfers (@xvonfers) 's Twitter Profile Photo

🤔 [$55000](CVE-2024-12692)[382291459][wasm]Type Confusion in V8(comparison of canonical struct types) "Compare fields, including a check that the size is the same and compare mutabilities, skipping the check for the size" chromereleases.googleblog.com/2024/12/stable… chromium-review.googlesource.com/c/v8/v8/+/6074… Xion

xvonfers (@xvonfers) 's Twitter Profile Photo

(CVE-2024-9122)[365802567][$55000][wasm]WASM type confusion due to imported tag signature subtyping is now open with PoC and exploit(pops calc from a '--no-sandbox' renderer): issues.chromium.org/issues/3658025… Xion

(CVE-2024-9122)[365802567][$55000][wasm]WASM type confusion due to imported tag signature subtyping is now open with PoC and exploit(pops calc from a '--no-sandbox' renderer):
issues.chromium.org/issues/3658025…

<a href="/0x10n/">Xion</a>
Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

📯 Announcing the top 20 Chrome VRP researchers for 2024: crbug.com/386306231 📯 Congratulations to everyone on the list! Many thanks and much gratitude to our entire Chrome VRP researcher community and helping us make Chrome Browser & Chromium more secure for all users! 🎊

Carl Smith (@cffsmith) 's Twitter Profile Photo

I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Wasm! Go check it out at github.com/googleprojectz…. While we still have a way to go in improving it, we think it shows a promising approach!

Xion (@0x10n) 's Twitter Profile Photo

Sure, renderer exploits are fun, but have you tried adding hash collision constraints to it? crbug.com/381696874 crbug.com/382291459

Xion (@0x10n) 's Twitter Profile Photo

I guess v8sbx bypass reports does not require reproducers for VRP? Which I thought wouldn't even be a valid report as in g.co/chrome/vrp/#v8… 🤔 e.g. crbug.com/390568183 vs crbug.com/390816209 which I had it early in my stash, only to dup with a report w/o a repro 🤦

TyphoonCon🌪️ (@typhooncon) 's Twitter Profile Photo

The Chrome RCE has been verified! The disclosure process with the vendor is now in progress. Kudos on a sharp discovery #TyphoonCon25