Maurizio Barbaro
I am a seasoned IT professional with a rich history spanning 38 years in the fields of system engineering, software development and security analysis. My journey began with a foundational education in telecommunications. Over the years, I have honed my skills and expertise, earning certifications such as the Red Hat Certified Engineer and Certified Information Security Manager. My professional path led me to Red Hat, where I currently contribute as a Senior Software Maintenance Engineer, focusing on security updates for long-term-support Red Hat Enterprise Linux releases. Prior to this, I served as a Senior DevOps and Security Analyst at Kensu, and spent over three decades at Italtel, where I advanced from a Senior Software Engineer to a Senior Security Specialist. My passion for technology and security drives me to share my knowledge and mentor the next generation of IT professionals. I am committed to fostering a collaborative environment where innovation and learning thrive.
Red Hat
Job title –Senior Software Maintenance Engineer
Session
Use After Free (UAF) vulnerabilities are a stealthy and dangerous type of memory management flaw that can lead to severe security breaches. When a program continues to use memory after it has been freed, it opens the door to unexpected behavior, crashes, and even remote code execution. These vulnerabilities are particularly prevalent in memory-unsafe languages like C or C++ and can be exploited by attackers to inject malicious code or access sensitive data.
In this talk, we will explore the root causes of UAF vulnerabilities, how they can be exploited (with demos) and the best practices to prevent them to safeguard your applications and ensure robust security.