Samuel Groß

No Clicks Required: Exploiting Memory Corruption Vulnerabilities in Messenger Apps

Abstract

This talk will dive into the internals of an iMessage exploit that achieves unsandboxed remote code execution on vulnerable iPhones (versions up to iOS 12.4) without user interaction and within a couple of minutes. After a short introduction of the vulnerability, a set of techniques will be shown that allow the exploit to first bypass ASLR, then achieve arbitrary code execution even on PAC-capable devices. The talk will ultimately highlight how seemingly harmless features that are commonly exposed on “0-Click” surfaces enable the exploitation of memory corruption vulnerabilities.

BIO

Samuel (https://twitter.com/5aelo) works at Google Project Zero where he does offensive security research, mainly focused on web browsers and mobile devices.