Article 5T3CS A deep dive into an NSO zero-click iMessage exploit: remote code execution

A deep dive into an NSO zero-click iMessage exploit: remote code execution

by
Thom Holwerda
from OSnews on (#5T3CS)

Google's Project Zero describes a (now fixed) zero-click exploit in iMessage, and, well, it's kind of insane.

JBIG2 doesn't have scripting capabilities, but when combined with a vulnerability, it does have the ability to emulate circuits of arbitrary logic gates operating on arbitrary memory. So why not just use that to build your own computer architecture and script that!? That's exactly what this exploit does. Using over 70,000 segment commands defining logical bit operations, they define a small computer architecture with features such as registers and a full 64-bit adder and comparator which they use to search memory and perform arithmetic operations. It's not as fast as Javascript, but it's fundamentally computationally equivalent.

Mother of god.

External Content
Source RSS or Atom Feed
Feed Location http://www.osnews.com/files/recent.xml
Feed Title OSnews
Feed Link https://www.osnews.com/
Reply 0 comments