Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

To be fair, it sounds like it uses a combination of an IE bug and Flash bug.

The exploit leverages a previously unknown use-after-free vulnerability, and uses a well-known Flash exploitation technique to achieve arbitrary memory access and bypass Windows’ ASLR and DEP protections.

...

The SWF file calls back to Javascript in IE to trigger the IE bug and overwrite the length field of a Flash vector object in the heapspray.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: