-
-
[翻译]Pegasus三叉戟漏洞原理分析及Poc(CVE-2016-4656)
-
发表于:
2016-9-3 15:14
12424
-
[翻译]Pegasus三叉戟漏洞原理分析及Poc(CVE-2016-4656)
OSObject*
OSUnserializeXML(const char *buffer, size_t bufferSize, OSString **errorString)
{
if (!buffer) return (0);
if (bufferSize < sizeof(kOSSerializeBinarySignature)) return (0);
if (!strcmp(kOSSerializeBinarySignature, buffer)) return OSUnserializeBinary(buffer, bufferSize, errorString);
// XML must be null terminated
if (buffer[bufferSize - 1]) return 0;
return OSUnserializeXML(buffer, errorString);
}
# Dictionary
# Array
# Set
# Number
# Symbol
# String
# Data
# Boolean
# Object (reference to previously deserialized object)
if (!isRef)
{
setAtIndex(objs, objsIdx, o);
if (!ok) break;
objsIdx++;
}
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!