![]() Heap Buffer Overflows due to logical bugs in memory management (BADMEMSIZE constant), exploitable via multiple file formats on Linux.Heap Memory Corruption due to logical bugs in memory management.Multiple (4) instances of Heap Buffer Overflows due to integer problems.Heap Buffer Overflow due to Integer Overflow.4-Byte Heap Buffer Overflow due to an Off-By-One in bounds checking.Heap Memory Corruption due to Integer Underflow.Below you will find the original reports I sent to the vendor in September: Ucieczka z Matrixa: (nie)bezpieczna analiza malware (3.85 MB, PDF)Ī part of the presentation was dedicated to multiple memory corruption Hex-Rays IDA Pro vulnerabilities I discovered earlier this year (see the product Changelog). While the talk was prepared entirely in Polish, most of the slides should be easily understandable by English speakers, and Google Translate works pretty well, so I decided to share them here anyway: ![]() The presentation was lightly technical and concerned the different threats of using popular software to aid in interacting with and analyzing malware samples. “Escaping the Matrix: (in)secure malware analysis”). Extract out from E-SPIN webinar session, for more about Hex-Rays Decompilers and IDA Pro, feel free to contact. Yesterday I gave a talk at a Polish security conference held in Warsaw, Poland, called “Ucieczka z Matrixa: (nie)bezpieczna analiza malware” (eng. This video is about Hex Rays IDA Pro and Decompiler for binary code analysis.
0 Comments
Leave a Reply. |