[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3fa2f5bb0910011255w380c49b6pdfd3eb1a14095e97@mail.gmail.com>
Date: Thu, 1 Oct 2009 21:55:37 +0200
From: Berend-Jan Wever <berendjanwever@...il.com>
To: Freddie Vicious <fred.vicious@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Exploiting memory corruption vulnerabilities
on Internet Explorer 8
FYI: ASLR & DEP can be bypassed on x86, there's just nothing public at the
moment.
Cheers,
SkyLined
Berend-Jan Wever <berendjanwever@...il.com>
http://skypher.com/SkyLined
On Thu, Oct 1, 2009 at 6:44 PM, Freddie Vicious <fred.vicious@...il.com>wrote:
> Yes, I am aware of the JVM and the Flash AVM heap spray techniques, no
> DEP/ASLR there... But as you said, so far there's no known "catch-all"
> technique against IE8.
> Along with other security features (
> http://blogs.msdn.com/architecture/archive/2009/08/13/internet-explorer-8-rated-tops-against-malware-and-phishing-attacks.aspx)
> this basicly means that IE8 is the most secure web browser nowadays?
>
> On Thu, Oct 1, 2009 at 8:27 AM, Jared DeMott <jared.demott@...ris.com>wrote:
>
>> I'm not aware of any catch-all technique just for IE8, though there are
>> a few common ones like return oriented programming. Application
>> specific techniques are also common when third party extensions are
>> involved.
>>
>> --
>> __________________________________________
>> Jared D. DeMott
>> Principal Security Researcher
>>
>>
>
>
> --
> Best wishes,
> Freddie Vicious
> http://twitter.com/viciousf
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists