Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2014-08-26 13:15:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
The poisoned NUL byte, 2014 edition (Project Zero)
For those interested in the gory details of a complex exploit, Google's
Project Zero page describes
the process
of getting arbitrary code execution from a single NUL byte
written to the heap by glibc in an off-by-one error. "The main point of
going to all this effort is to steer industry narrative away from quibbling
about whether a given bug might be exploitable or not. In this specific
instance, we took a very subtle memory corruption with poor levels of
attacker control over the overflow, poor levels of attacker control over
the heap state, poor levels of attacker control over important heap content
and poor levels of attacker control over program flow. Yet still we were
able to produce a decently reliable exploit! And there’s a long history of
this over the evolution of exploitation: proclamations of
non-exploitability that end up being neither advisable nor correct.
"


(Читать комментарии) (Добавить комментарий)