memory-safety

3 articles
Sort: New Top Best
clear filter
0
vulnerability

A low-severity bug in the TypedMemView library's isValid function was caused by incorrect use of the bitwise NOT instruction instead of the ISZERO instruction in Yul assembly, causing the function to always return true regardless of whether memory bounds were valid. The bug was responsibly disclosed to Nomad, patched by replacing 'not' with 'iszero', and publicly documented.

TypedMemView Nomad Nikita Stupin Immunefi Center for Contemplative Research summa-tx/memview-sol
nikitastupin.com · Nikita Stupin · 4 hours ago · details
0

This article explains how buffer overflow vulnerabilities work, demonstrating how attackers craft malicious input to overwrite stack memory, particularly return addresses, to execute arbitrary code. It covers the mechanics of stack buffer overflows, practical examples in C, and discusses modern OS-level and compiler-based prevention techniques like DEP, ASLR, and stack canaries.

Invicti Piotr Sobolewski StackGuard Linux Microsoft Windows macOS
netsparker.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

An educational guide explaining buffer overflow and buffer overrun vulnerabilities, their exploitation methods, and attacks, as part of Veracode's application security resource hub covering AppSec concepts and best practices.

Veracode OWASP
veracode.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details