Scr33n0r, stop posting stupid shit in otherwise good threads, please?
Tmp -- It really depends on the implementation. Yes, that makes it a lot trickier, but I'm rather sure that there's ways to get around it. I would need more specifics on it. Perhaps you can do it with a search? Or with randomness? Or by attacking key areas, or using known values? If I do a malloc() in my shellcode, and base my attack at a certain relative location to that heap address, does that give me access? I can start searching the heap based on the location that I'm given by malloc() and find an important value that will help me take over the world? It's all just in theory, it depends on the implementations of everything involved.
I realize you're trying to inspire argument, "something to think about"-style, so good job.
c0n -- Full disclosure helps security professionals of all kinds. The same security professionals that are going to be helping me in my career. If I help out a lot of people, and get my name known, it will be a lot easier to get a job. That's why I do a lot of volunteer work for whitehats, and I try to make as many friends and become a member of as many groups (in real life, I mean) as I can. It's all about having work in the future.
Plus, I greatly enjoy what I do, and I like to see others benefit from it.