Heap Exploitation Part 1: Understanding the Glibc Heap Implementation

Heap Exploitation Part 1: Understanding the Glibc Heap Implementation

These heap-based vulnerabilities are more difficult to understand than their stack-based counterparts because attack techniques against heap-based vulnerabilities can be very dependent on how the internal implementation of the heap allocator actually works. In the next post I will do a deeper dive into the technical implementation of how those concepts are implemented in glibc’s heap allocator. So for this and the next few posts, I’ll be focusing on the glibc heap allocator, i.e. how heap allocations work for C/C++ programs running on Linux devices by default.

Source: azeria-labs.com