Monday, November 7, 2011

DEFCON 19: Kernel Exploitation Via Uninitialized Stack

Speaker: Kees Cook Ubuntu Security Engineer, Canonical Ltd

Leveraging uninitialized stack memory into a full-blown root escalation is easier than it sounds. See how to find these vulnerabilities, avoid the pitfalls of priming the stack, and turn your "memory corruption" into full root privileges.


Post a Comment