cool. Tested on AMD64 with DEP enabled. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Friday, January 28, 2005 5:41 PM To: [email protected] Subject: [Full-Disclosure] [ Positive Technologies ] Defeating MicrosoftWindows XP SP2 Heap protection
It was discovered by MaxPatrol team that it is possible to defeat MicrosoftR WindowsR XP SP2 Heap protection and Data Execution Prevention mechanism. As a result it is possible to implement: - Arbitrary memory region write access (smaller or equal to 1016 bytes); - Arbitrary code execution; - DEP bypass. Details are described in the article: http://www.maxpatrol.com/ptmshorp.asp -- Best regards, aanisimov mailto:[EMAIL PROTECTED] _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
