Comment by comex
4 years ago
> How many of the large state-sponsored penetrations (i.e. the ones we're most likely to hear about) used buffer overflows?
It really depends on the target. If you’re attacking a website, then sure, you’re more likely to find vulnerability classes like XSS that can exist in memory-safe code. When you’re talking about client-side exploits like the ones used by NSO Group, though, almost all of them use memory corruption vulnerabilities of some sort. (That doesn’t only include buffer overflows; use-after-free vulnerabilities seem to be the most common ones these days.)
No comments yet
Contribute on Hacker News ↗