TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A Tale of Two Exploits

44 pointsby 2510c39011c5about 10 years ago

3 comments

quanticleabout 10 years ago
This is a quintessential example of why it&#x27;s a very bad thing for the NSA to hoard zero-days. It&#x27;s easy to forget that the black hats are looking for zero days too, and the fact that you&#x27;ve found an undisclosed vulnerability doesn&#x27;t mean that that you&#x27;re the the only one to have found this vulnerability, or even that you&#x27;re the first one.<p>In the example from the article, it&#x27;s likely that the black hats found the zero day first, and were in the process of updating their attack toolkits when the Project Zero team came across the issue and notified Adobe. If it had been the NSA that found this issue, no one would have been notified, and the black hats would have had days or weeks to refine their attacks before a patch was issued.
SloopJonabout 10 years ago
I&#x27;m not familiar with the term bug collision, and I don&#x27;t quite grok it from context. Is this another way of saying independent discovery?
评论 #9376229 未加载
CGamesPlayabout 10 years ago
I&#x27;m no security researcher, but the proof of concept looks like there just exists this API where you get to set a memory address and call from a limited pool of functions. Based on that observation, this hardly seems like an exploit--it looks like &quot;as designed&quot;. What made Adobe&#x2F;Macromedia&#x2F;whoever originally decide that this interface was &quot;secure&quot;? Am I missing something?
评论 #9376701 未加载
评论 #9377154 未加载