Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Magic values in 32-bit processes on 64-bit OS-es and how to exploit them
Jun 21 2016 03:01PM
Berend-Jan Wever (berendjanwever gmail com)
(You can read all this information in more detail on
Software components such as memory managers often use magic values to
mark memory as having a certain state. These magic values can be used
during debugging to determine the state of the memory, and have often
(but not al...
[ more ]
Copyright 2010, SecurityFocus