Incorrect length of data in memory or incorrectly aligned data in the memory can lead to memory corruption. Data present in the memory can be overwritten with other data causing corruption. Memory corruption can be exploited by an attacker to cause system crash or give control over to the attacker. It can be exploited in software and hardware. It can be done on software side or hardware side. Hardware side can be done by modifying the data while it is being copied into memory. Software side can be done by modifying the source code while it is being copied into memory. It can happen due to various reasons like faulty software, hardware compatibility issues, improper handling of data by software, and due to various other factors. It can be done by modifying data while it is being copied into memory or by modifying the source code while it is being copied into memory.

Software Side:

Affected software:
** Microsoft Windows Vista and later versions **
Affected operating systems:
** Microsoft Windows NT, 2000, XP, 2003, 2008 and later versions **
Affected platforms:
** x86-based and x64-based architectures **
Affected applications:
** Microsoft Office 2007 (32-bit) **
Affected services:
** Internet Information Services 7.0 Service Pack 2 for 32-bit Systems and Internet Information Services 6.0 Service Pack 1 for 64-bit Systems **

Software Side

Exploiting Software Side Memory Corruption:
It is possible to exploit software side memory corruption by modifying the source code while it is being copied into memory. It can be done by modifying the data while it is being copied into memory or by modifying the source code while it is being copied into memory.

Timeline

Published on: 11/15/2022 10:15:00 UTC
Last modified on: 11/18/2022 04:58:00 UTC

References