Linux Exploits & Mitigation: Memory and Pointer Vulnerabilities
Memory and pointer vulnerabilities come from a number of common programmer mistakes. Being able to recognize debug and fix unsafe memory allocation and access errors is essential to avoiding vulnerabilities. In this course youll explore how memory and pointer vulnerabilities arise and how they lead to program errors and exploits. Youll look at how memory is allocated and accessed in a typical C program. Youll investigate what causes heap and stack overflows use-after-free (UAF) vulnerabilities and out-of-bounds access errors. In addition youll recognize dangling pointers NULL dereferences and off-by-one loops. Finally youll delve into how coding errors lead to corrupted memory and arbitrary code execution.