Exploiting memory corruption vulnerabilities in server-side software often requires knowledge of the binary and environment, which limits the attack surface, especially for unknown binaries and load-balanced environments. Successful exploitation is challenging due to the difficulty of preparing the heap and deploying ROP chains without this information. Researchers discovered vulnerabilities in the Kakadu JPEG 2000 library, […]
The post Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.