This multi-stage hack starts with the Mac-user victim visiting a malicious website and ends with malicious code executing in the kernel. Used successfully at pwn2own 2018.
https://github.com/saelo/pwn2own2018
Contest results, including for the above exploit:
https://www.thezdi.com/blog/2018/3/14/pwn2own-2018-results-from-day-one
https://github.com/saelo/pwn2own2018
Contest results, including for the above exploit:
https://www.thezdi.com/blog/2018/3/14/pwn2own-2018-results-from-day-one
Comments
Post a Comment