@Unixbigot
Cool power fantasy.
That's not how the engineering works. You can't overflow an audio buffer because you have no control over the length field and whether silent, noisy or musical every audio input fills the buffer the same.
Top-level
@Unixbigot That's not how the engineering works. You can't overflow an audio buffer because you have no control over the length field and whether silent, noisy or musical every audio input fills the buffer the same. 2 comments
> heh, you must be fun at parties. I am told i am. Thanks. I couldn't find any such cases. A shell shouldn't overflow. However bad string handling and thereby allow injecting a shell command is a vulnerability i find plausible. > What I /do/ know is that a microphone implies an input and an input could be turned into a string. And an string passed to a shell can become a portal injecting commands. Would have not broken my suspension of disbelief. Cheers |
@freemin7 heh, you must be fun at parties. What the Piper chose not to waste any more of the 100-word budget on is that devices with microphones sometimes listen for modulated ultrasonic configuration commands, and there have been documented cases of IoT devices passing received input to shell commands. You can literally root some devices by overflowing the wifi password.