Monday, November 7, 2011

DEFCON 19: Kernel Exploitation Via Uninitialized Stack



Speaker: Kees Cook Ubuntu Security Engineer, Canonical Ltd


Leveraging uninitialized stack memory into a full-blown root escalation is easier than it sounds. See how to find these vulnerabilities, avoid the pitfalls of priming the stack, and turn your "memory corruption" into full root privileges.

0 comments:

Post a Comment