HN2new | past | comments | ask | show | jobs | submitlogin

Well, it's true that the initial vector is often third-party software. But once you're able to run arbitrary code in a user-mode process running in a limited security context, you still need to attack some high-privilege component to get full control of the machine. Usually this component is the kernel, so additional kernel mitigations do help protect you.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: