Speaker: Kees Cook Ubuntu Security Engineer, Canonical Ltd
Leveraging uninitialized stack memory into a full-blown root escalation is easier than it sounds. See how to find these vulnerabilities, avoid the pitfalls of priming the stack, and turn your "memory corruption" into full root privileges.
0 comments:
Post a Comment