Blog | G5 Cyber Security

Researchers Finding New Ways to Bypass Exploit Mitigations

Software makers have spent the last few years adding new memory-protection and exploit-mitigation technologies such as ASLR, DEP and SafeSEH to their products. But the state of the art in exploitation has advanced just as steadily and, as researchers showed at CanSecWest this week, bypassing these protections is challenging, but increasingly feasible. The clearest example of this is the Pwn2Own victory by Peter Vreugdenhil, a Dutch researcher who was able to exploit a previously unknown vulnerability in Internet Explorer 8 on 64-bit Windows 7.

Source: https://threatpost.com/researchers-finding-new-ways-bypass-exploit-mitigations-032510/73745/

Exit mobile version