Sabniveesu Shashank shashank16392 at gmail.com
Mon Jun 3 10:13:47 BST 2013
Mon Jun 3 10:13:47 BST 2013
- Previous message: [Full-disclosure] exploitation ideas under memory pressure
- Next message: [Full-disclosure] Call For Papers - Balkan Computer Congress 2013
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
It seems I missed the start of this discussion. Can you tell me where this exploit is applicable? Regards Shashank On Mon, Jun 3, 2013 at 11:22 AM, Tavis Ormandy <taviso at cmpxchg8b.com> wrote: > On Mon, May 20, 2013 at 02:35:54PM -0700, Tavis Ormandy wrote: > > I'm quite proud of this list cycle trick, here's how to turn it into an > > arbitrary write. > > > > There's a public solution now, here's my version. Thanks to progrmboy > for an exploitation idea he came up with that hadn't occurred to me. > > Tavis. > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130603/5deeebe5/attachment.html>
0 comentários:
Postar um comentário