We have analyzed the code ourselves and can confirm that it works reliably against 32-bit Windows Vista and Windows Server 2008 systems. The exploit gains complete control of the targeted system and can be launched by an unauthenticated user.Je pense que c'est la premiere fois que je vois ca. Ca fait plaisir :)
Secure by Design: Google’s Perspective on Memory Safety
-
Alex Rebert, Software Engineer, Christoph Kern, Principal Engineer,
Security Foundations
Google’s Project Zero reports that memory safety vulnerabilities—...
2 weeks ago
3 comments:
Microsoft fait partie de vos clients "Early Updates", ou ils ont une version leakée ? :)
Félicitation pour cette belle démonstration de codage d'exploit :-)
De rien...
Post a Comment