Speaker: Kees Cook Ubuntu Security Engineer, Canonical Ltd
Leveraging  uninitialized stack memory into a full-blown root escalation is easier  than it sounds. See how to find these vulnerabilities, avoid the  pitfalls of priming the stack, and turn your "memory corruption" into  full root privileges.
 
 
0 comments:
Post a Comment