[Full-disclosure] Exploiting memory corruption vulnerabilities on Internet Explorer 8
yersinia.spiros at gmail.com
Sat Oct 3 20:53:44 BST 2009
On Thu, Oct 1, 2009 at 6:44 PM, Freddie Vicious <fred.vicious at gmail.com>wrote:
> Yes, I am aware of the JVM and the Flash AVM heap spray techniques, no
> DEP/ASLR there... But as you said, so far there's no known "catch-all"
> technique against IE8.
> Along with other security features (
> this basicly means that IE8 is the most secure web browser nowadays?
> Depends. IMHO Non exists the more secure browser, anyway (not exists the
more secure software, never ) . But exists the more secure env on which the
browser run. There are some difference if i run firefox in windows xp and if
i run run firefox within a selinux guest account under Fedora.
> On Thu, Oct 1, 2009 at 8:27 AM, Jared DeMott <jared.demott at harris.com>wrote:
>> I'm not aware of any catch-all technique just for IE8, though there are
>> a few common ones like return oriented programming. Application
>> specific techniques are also common when third party extensions are
>> Jared D. DeMott
>> Principal Security Researcher
> Best wishes,
> Freddie Vicious
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-------------- next part --------------
An HTML attachment was scrubbed...
Full-Disclosure is hosted and sponsored by Secunia.