Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
saagarjha
on Feb 11, 2021
|
parent
|
context
|
favorite
| on:
Dependency Confusion: How I Hacked Into Apple, Mic...
Escaping the VM via an out-of-bounds write doesn't really show that stack walking is broken :/
nmadden
on Feb 11, 2021
[–]
That’s just the first example. As the author of that series writes, most of the exploits are not due to memory corruption. Most are confused deputy attacks where privileged code can be tricked into performing dangerous operations.
saagarjha
on Feb 11, 2021
|
parent
[–]
Oh, I don't doubt it. I'm just saying that the particular example you linked wasn't that great.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: