Flutterby™! : NSO zero-click

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

NSO zero-click

2021-12-16 18:39:27.131981+01 by Dan Lyke 0 comments

Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution. So an iMessage call that was just supposed to save a .gif file also tried to parse the .gif file, but with a general file parser. When sent a properly crafted JBIG2 file, the PDF parser interpreted that in a way that could overflow and allow arbitrary writes to its memory, which let that create a virtual machine that could start to make other larger decisions on exploits.

Really crafty interesting stuff.

Edit: the MeFi thread

comments in descending chronological order (reverse):