Exploit Development: Swimming In The (Kernel) Pool - Leveraging Pool Vulnerabilities From Low-Integrity Exploits, Part 2
Combining part 1’s information leak vulnerability with a pool overflow vulnerability to obtain code execution via grooming the kLFH