10.01.2015 Views

2014_EN_BrowserFuzzing_RosarioValotta

2014_EN_BrowserFuzzing_RosarioValotta

2014_EN_BrowserFuzzing_RosarioValotta

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Memory corruption vulns: a primer<br />

• Special kind of access violation bugs<br />

• Av bug is said to exploitable if:<br />

• It allows to control execution flow<br />

• the attacker has full control on the register causing the violation<br />

ACCESS<br />

VIOLATIONS<br />

Trying to perform r/w<br />

operations on illegal or<br />

restricted memory locations<br />

Attempt to write to an invalid<br />

memory location pointed by a<br />

register<br />

WRITE<br />

GS<br />

Violation<br />

READ<br />

Attempt to read from a register<br />

pointing to an invalid memory<br />

location<br />

HEAP<br />

CORRUPTI<br />

ON<br />

DEP<br />

Violation<br />

/Read AV<br />

on EIP<br />

READ AV<br />

mov eax, [ebx]<br />

call [eax]<br />

G<strong>EN</strong>ERIC<br />

register<br />

(eax=deadbeef)<br />

mov eax, [edx]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!