Flutterby™! : NSO zero-click

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

NSO zero-click

2021-12-16 18:39:27.131981+01 by Dan Lyke 0 comments

Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution. So an iMessage call that was just supposed to save a .gif file also tried to parse the .gif file, but with a general file parser. When sent a properly crafted JBIG2 file, the PDF parser interpreted that in a way that could overflow and allow arbitrary writes to its memory, which let that create a virtual machine that could start to make other larger decisions on exploits.

Really crafty interesting stuff.

Edit: the MeFi thread

comments in ascending chronological order (reverse):

Comment policy

We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.


Flutterby™ is a trademark claimed by

Dan Lyke
for the web publications at www.flutterby.com and www.flutterby.net.