-
-
[翻译]Pegasus三叉戟漏洞原理分析及Poc(CVE-2016-4656)
-
发表于:
2016-9-3 15:14
12690
-
[翻译]Pegasus三叉戟漏洞原理分析及Poc(CVE-2016-4656)
OSObject*
OSUnserializeXML(const char *buffer, size_t bufferSize, OSString **errorString)
{
if (!buffer) return (0);
if (bufferSize < sizeof(kOSSerializeBinarySignature)) return (0);
if (!strcmp(kOSSerializeBinarySignature, buffer)) return OSUnserializeBinary(buffer, bufferSize, errorString);
// XML must be null terminated
if (buffer[bufferSize - 1]) return 0;
return OSUnserializeXML(buffer, errorString);
}
# Dictionary
# Array
# Set
# Number
# Symbol
# String
# Data
# Boolean
# Object (reference to previously deserialized object)
if (!isRef)
{
setAtIndex(objs, objsIdx, o);
if (!ok) break;
objsIdx++;
}
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课