Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I would guess it involves spamming the server with specially crafted requests to fill memory with bytecode. After some trial and error (vast simplification) the request from the article could be used to divert the flow of execution into the bytecode spam, rather than causing DoS. The DoS is likely because flow of execution is being diverted to a random area of memory that doesn't contain anything executable, and so crashes instead.

The heap spraying is the missing puzzle piece from the article.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: