• Mr. Semi@lemmy.world
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    3 months ago

    Really annoyed by the term “zero day” being used for every kind of exploit now.

    Everything in English speaking culture has to be either the best or the worst, every statement hyperbolized. It’s not just an exploit it’s a ZERO DAY OMG.

    disclosed active exploitation

    So, not a fucking zero day.

    • booly@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      3 months ago

      disclosed active exploitation

      So, not a fucking zero day.

      I’m confused. Isn’t an active exploit that hasn’t been patched yet, by definition, a zero day? So the release of a new patch that closes an actively exploited vulnerability patches a zero-day?

      • Mr. Semi@lemmy.world
        link
        fedilink
        English
        arrow-up
        13
        ·
        edit-2
        3 months ago

        No.

        A zero day is an exploit that has been identified by someone but not yet used. Zero days in use/disclosed.

        Reporting should use the term “zero day” in the context of discovery when it is first used, not something that is in regular use by fucking forensics.

        • booly@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          7
          ·
          3 months ago

          A zero day is an exploit that has been identified by someone but not yet used.

          I’ve always understood that the counting of days comes from the vendor’s knowledge. So any exploit from before Google was aware of the vulnerability would be a zero day.

          It wouldn’t make any sense to refer to the days counted from when an attacker first discovers the vulnerability, because by definition any vulnerability in active exploitation wouldn’t be a zero day.

          • Syn_Attck@lemmy.today
            link
            fedilink
            English
            arrow-up
            6
            ·
            edit-2
            3 months ago

            Yeah… Unless Gen Z changed it, from 2008 to 2017 (when I got out of infosec) a 0day was an exploit that the vendor didn’t know about, and that only a few people knew about (otherwise it would be quickly known about by the vendor.)

            I don’t know what @[email protected] is on about, or who is upvoting them, but that would mean it’s no longer a 0day once you’ve discovered and made your own exploit for the vulnerability.

            From wikipedia (still current to our definition, so I assume Gen Z hasn’t changed it):

            A zero-day (also known as a 0-day) is a vulnerability or security hole in a computer system unknown to its owners, developers or anyone capable of mitigating it.[1] Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit, or zero-day attack.

    • xycu@programming.dev
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 months ago

      The acronym GOAT has been around since well before those zoomers were born, probably before most of their parents were born, so don’t feel too embarrassed!

  • bigkahuna1986@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 months ago

    Any chance we’ll be able to use these to gain root on a Pixel without unlocking the bootloader?

  • Quereller@lemmy.one
    link
    fedilink
    English
    arrow-up
    2
    ·
    3 months ago

    What is in the dumped memory (for CVE-2024-29745 )?

    Can the device encryption keys be extracted from this ? Or is it more random data?