Researchers have developed a method of exploiting how CPUs manage memory to map RAM memory and discover where software components, such as files and libraries, are located and exploit vulnerabilities in them.
The security technology that randomizes RAM locations where various components are located, named Address space layout randomization (ASLR), has been around in Windows systems for almost a decade, starting with Windows Vista. Its purpose is to make it difficult for attacker to find these components to exploit them.
Given sufficient time, the script could tell attackers what components are on the victim’s computer and where. Armed with that information, attackers could allegedly compromise the victim’s PC by remotely executing malicious payloads and seizing control of the entire system.