Happy belated Thanksgiving everyone! We have two updates for you this week to the eEye Research Portal.
The first is an update to an already solid tool, Faultmon. This has a few added features to help with your debugging experience.
The second update to the Portal is a new presentation fresh off of the pdf printer. "Memory Retrieval Vulnerabilities" is a presentation prepared by eEye researcher Derek Soeder back in October 2006 however it never found a suitable home at a conference so we are just releasing it here. It discusses theoretical coding flaws that could offer an attacker a glimpse into the stack or heap, or possibly arbitrary process memory, thereby allowing the construction of more reliable exploits against a vulnerable process -- even in spite of generic security measures such as /GS and ASLR that rely upon unpredictability. Select real-world examples are provided, including a NETAPI32 (Server Service) vulnerability silently fixed in MS06-040. Notes are included on many of the slides to provide additional details.
Stay tuned for more updates in the near future!