https://security.apple.com/blog/towards-the-next-generation-...
On heap protection: if you spray the heap with predictable data patterns you can improve your chance of landing a useful address, even with ASLR in place
Sprays are pretty crashy but the heap setup is not usually the problem, its that the pointer you want to control "missed" the sprayed area.
There’s a strong chance it’s vulnerable, too
wonder if this is a way to get into the stack.
However we all know that the problem is that juniors and interns are the ones that get to write this code, a senior with proper education would never deliver these mistakes into production. /s
Article titled "Someone At YouTube Needs Glasses" about YouTube layout: 837 points and rising
Hacker News my a*s
throw0101a•9mo ago
* https://support.apple.com/en-ca/122374
Apple fixed their stuff, but third-parties who used their SDK will have to issue updates as well.
john_alan•9mo ago
Reads like a zero click infection leading to arbitrary execution of long running code.
Seems fairly insidious?