Jump to content
Nytro

Pwn2Own 2013 Java Exploit Details

Recommended Posts

Posted

[h=1]Pwn2Own 2013 Java Exploit Details[/h]

[h=2]In March 2013, during the annual Pwn2Own competition at CanSecWest, Accuvant LABS’ Joshua J. Drake demonstrated a successful attack against Oracle’s Java Runtime Environment (JRE). The demonstration proved exploiting memory corruption vulnerabilities in Oracle’s JRE 7 is still possible despite modern exploit mitigations. Accuvant LABS’ exploit code, as well as a white paper containing detailed information about the vulnerabilities, primitives and exploitation techniques, is available for download below.[/h]

Download:

https://www.accuvant.com/sites/default/files/downloads/pwn2own_2013_-_java_7_se_memory_corruption.pdf

Data:

https://www.accuvant.com/sites/default/files/downloads/pwn2own2013-jre7.zip

Sursa: http://www.accuvant.com/capability/accuvant-labs/security-research/pwn2own-2013-java-exploit-details

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...