You make no mention of exploit mitigations like EMET or Windows Defender Exploit Guard. If your exploit requires that a "controlled address were jumped to", then even just mandatory ASLR (provided by both EMET and WDAG) would stop the exploit, no?
Given how old the program is, and that it was written by another company, I wouldn't be surprised if Microsoft couldn't rebuild it from source themselves. But that's just a guess.
-
-
Plausible.
-
Can't imagine how one would make the compiler use the same function offsets when size of said functions' code has changed.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.