Recently, a security researcher Chris Evans released a well-written exploit that uses rather unusual methods to exploit memory corruption vulnerability in Gstreamer. There are two security protections built into Linux – address space layout randomization (ASLR) and data execution protection (DEP). The second one is meant to block an exploit’s ability to load into memory …
Continue reading “Hacking Linux: Exploit Bypasses Security Measures”