The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Russinovich: A possible cure for exploitable heap corruption in Windows 7
Time: 05:35 EST/10:35 GMT | News Source: BetaNews | Posted By: Kenneth van Surksum

The key to a huge plurality, if not a majority, of exploits that have plagued Microsoft Windows over the past two decades has been tricking the system into executing data as though it were code. A malicious process can place data into its own heap -- the pile of memory reserved for its use -- that bears the pattern of executable instructions. Then once that process intentionally crashes, it can leave behind a state where the data in that heap is pointed to and then executed, usually without privilege attached.

Write Comment
Return to News

  Displaying 676 through 677 of 677
Prev | First
  The time now is 2:47:48 PM ET.
Any comment problems? E-mail us
#676 By 4240821 (45.192.45.37) at 11/10/2025 11:40:26 PM
https://www.pillowfort.social/posts/6779265
https://www.pillowfort.social/posts/6779090
https://www.pillowfort.social/posts/6779038
https://www.pillowfort.social/posts/6778954
https://www.pillowfort.social/posts/6778753
https://www.pillowfort.social/posts/6777854
https://www.pillowfort.social/posts/6777694
https://www.pillowfort.social/posts/6777424
https://www.pillowfort.social/posts/6777156
https://www.pillowfort.social/posts/6776485

#677 By 4240821 (45.192.45.37) at 11/11/2025 6:46:25 AM
https://www.pillowfort.social/posts/6612389
https://www.pillowfort.social/posts/6612296
https://www.pillowfort.social/posts/6612162
https://www.pillowfort.social/posts/6612034
https://www.pillowfort.social/posts/6611889
https://www.pillowfort.social/posts/6611735
https://www.pillowfort.social/posts/6611627
https://www.pillowfort.social/posts/6611453
https://www.pillowfort.social/posts/6611356
https://www.pillowfort.social/posts/6611195

Write Comment
Return to News
  Displaying 676 through 677 of 677
Prev | First
  The time now is 2:47:48 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *