The Windows Registry Adventure #8: Practical exploitation of hive memory corruption

Source

Posted by Mateusz Jurczyk, Google Project Zero In the previous blog post, we focused on the general security analysis of the registry and how to effectively approach finding vulnerabilities in it. Here, we will direct our attention to the exploitation of hive-based memory corruption bugs, i.e., those that allow an attacker to overwrite data within an active hive mapping in memory. This is a class of issues characteristic of the Windows registry, but u niversal enough that the techniques described here are applicable to 17 of my past vulnerabilities, as well as likely any similar bugs in the future. A [...]