Closed GoogleCodeExporter closed 9 years ago
Small correction regarding NULL mapping protections on OS X: the default linker
options on OS X will insert a 1 page __PAGEZERO section with a fixed mapping at
0 and --- protection, so userspace dereferences of any pointer to addresses on
the NULL page aren't exploitable. 0x2b288 falls well outside that and it would
be application specific if it were exploitable or not.
32 bit OS X processes allow native code to change the protection of that NULL
page mapping at runtime and therefore exploit *kernel* NULL pointer
dereferences - this is the fundamental difference to say linux where you need
to be root to lower mmap_min_addr and exploit a kernel NULL pointer dereference.
Original comment by ianb...@google.com
on 21 Oct 2014 at 10:11
Original comment by cev...@google.com
on 8 Nov 2014 at 2:37
http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
Original comment by cev...@google.com
on 20 Nov 2014 at 1:28
Original issue reported on code.google.com by
cev...@google.com
on 21 Oct 2014 at 12:09Attachments: