TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A Tale of Two Exploits

44 点作者 2510c39011c5大约 10 年前

3 条评论

quanticle大约 10 年前
This is a quintessential example of why it&#x27;s a very bad thing for the NSA to hoard zero-days. It&#x27;s easy to forget that the black hats are looking for zero days too, and the fact that you&#x27;ve found an undisclosed vulnerability doesn&#x27;t mean that that you&#x27;re the the only one to have found this vulnerability, or even that you&#x27;re the first one.<p>In the example from the article, it&#x27;s likely that the black hats found the zero day first, and were in the process of updating their attack toolkits when the Project Zero team came across the issue and notified Adobe. If it had been the NSA that found this issue, no one would have been notified, and the black hats would have had days or weeks to refine their attacks before a patch was issued.
SloopJon大约 10 年前
I&#x27;m not familiar with the term bug collision, and I don&#x27;t quite grok it from context. Is this another way of saying independent discovery?
评论 #9376229 未加载
CGamesPlay大约 10 年前
I&#x27;m no security researcher, but the proof of concept looks like there just exists this API where you get to set a memory address and call from a limited pool of functions. Based on that observation, this hardly seems like an exploit--it looks like &quot;as designed&quot;. What made Adobe&#x2F;Macromedia&#x2F;whoever originally decide that this interface was &quot;secure&quot;? Am I missing something?
评论 #9376701 未加载
评论 #9377154 未加载