Tuesdays and Thursday are going to be light for awhile as I have class on those nights. Here's a bit of filler from the recent past:
Win32 is susceptible to a unique form of attack called a shatter attack. It involves a buffer overflow in the message queueing that occrus between onscreen windows, specifically those for user input. Chris Paget, the paper's author, states that the vulnerability is currently unfixable (requires a major rewrite in how Win32 does business). It's not as bad as it sounds though, the exploit requires physical presence at the console.
Post a Comment