Full Disclosure mailing list archives
Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8
From: Berend-Jan Wever <berendjanwever () gmail com>
Date: Thu, 1 Oct 2009 21:55:37 +0200
FYI: ASLR & DEP can be bypassed on x86, there's just nothing public at the moment. Cheers, SkyLined Berend-Jan Wever <berendjanwever () gmail com> http://skypher.com/SkyLined On Thu, Oct 1, 2009 at 6:44 PM, Freddie Vicious <fred.vicious () gmail com>wrote:
Yes, I am aware of the JVM and the Flash AVM heap spray techniques, no DEP/ASLR there... But as you said, so far there's no known "catch-all" technique against IE8. Along with other security features ( http://blogs.msdn.com/architecture/archive/2009/08/13/internet-explorer-8-rated-tops-against-malware-and-phishing-attacks.aspx) this basicly means that IE8 is the most secure web browser nowadays? On Thu, Oct 1, 2009 at 8:27 AM, Jared DeMott <jared.demott () harris com>wrote:I'm not aware of any catch-all technique just for IE8, though there are a few common ones like return oriented programming. Application specific techniques are also common when third party extensions are involved. -- __________________________________________ Jared D. DeMott Principal Security Researcher-- Best wishes, Freddie Vicious http://twitter.com/viciousf _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Exploiting memory corruption vulnerabilities on Internet Explorer 8 Freddie Vicious (Oct 01)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 Jared DeMott (Oct 01)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 Freddie Vicious (Oct 01)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 Berend-Jan Wever (Oct 01)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 Valdis . Kletnieks (Oct 01)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 Freddie Vicious (Oct 03)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 Michal Zalewski (Oct 01)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 yersinia (Oct 03)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 Freddie Vicious (Oct 01)
- Re: Exploiting memory corruption vulnerabilities on Internet Explorer 8 Jared DeMott (Oct 01)