cool. Tested on AMD64 with DEP enabled.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, January 28, 2005 5:41 PM
To: [email protected]
Subject: [Full-Disclosure] [ Positive Technologies ] Defeating
MicrosoftWindows XP SP2 Heap protection


It was discovered by MaxPatrol team that it is possible to defeat MicrosoftR
WindowsR XP SP2 Heap protection and Data Execution Prevention mechanism.

As a result it is possible to implement:
- Arbitrary memory region write access (smaller or equal to 1016 bytes);
- Arbitrary code execution;
- DEP bypass.

Details are described in the article:

http://www.maxpatrol.com/ptmshorp.asp


--
Best regards,
 aanisimov                          mailto:[EMAIL PROTECTED]

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to