It is always the same story: The clever attacker ... finds a bug which damages memory (overflow, etc) ... analyses the unintended side-effects created (and because of the strict regularity of the system environment) ... easily crafts an exploit which grants him advantage.