The Community for Technology Leaders
Green Image
Issue No. 04 - July-Aug. (2012 vol. 10)
ISSN: 1540-7993
pp: 82-84
Chris Valasek , Coverity
Attackers can gain unauthenticated remote control of the program counter through CVE-2010-3972, a vulnerability in Microsoft's Internet Information Services FTP 7.5. This example of primitive chaining shows that attackers can combine information about the operating system, application, and vulnerability to create a viable exploit.
computer security, exploitation primitives, primitive chaining, Microsoft IIS FTP 7.5
Chris Valasek, "Primitive-Chaining Exploits: A Real-World Example", IEEE Security & Privacy, vol. 10, no. , pp. 82-84, July-Aug. 2012, doi:10.1109/MSP.2012.105
49 ms
(Ver 3.3 (11022016))