UAF vulnerability exploitation judgement method and device
The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
09.01.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene of the function, and constructing a first function sequence operation sample which is used for covering an abnormally released memory area; operating the first function sequence operation sample and confirming that the memory area is successfully covered; analyzing content of a controllable objectgenerated by the first function sequence operation sample in an operation process, and constructing a second function sequence operation sample which is used for controlling an execution process of asystem process; and operating the second function sequence operation sample and confirming that the UAF vulnerability can be exploited. According to the UAF vulnerability exploitation judgement method and device, exploitabilit |
---|---|
Bibliography: | Application Number: CN20171601966 |