Security Basics mailing list archives

Re: buffer overflow


From: "Bill Loren" <lorenb2 () bezeqint net>
Date: Wed, 23 Jul 2003 20:01:09 +0200

But isn't the "Smashing the stack for fun or profit" paper terribly outdated
?
Not that any buffer overflow concept has changed, but there are plenty of
bytes alignments and allocation problems in its 8 (?) years old examples.
B

----- Original Message -----
From: "Janus N. Tøndering" <janus () bananus dk>
To: <Sánchez Sanz>; <Javier" <jssanz () indra es>>
Cc: <security-basics () securityfocus com>
Sent: Wednesday, July 23, 2003 6:05 PM
Subject: Re: buffer overflow


On Wed, 2003-07-23 at 12:04, "Sánchez Sanz, Javier" wrote:
Hello, I'm new in this forum, and I would like to read something for
beginers (as a FAQ whih are you trying to do). But meanwhile, I would like
to know how a buffer overflow affects to vulnerability (in ports and so on).
I know what a socket, a UPD or TPC packet is.

Thanks,

Javi
You are probably looking for this:
http://www.phrack.org/phrack/49/P49-14

Janus
--
Janus N. Tøndering <janus () bananus dk>


---------------------------------------------------------------------------
----------------------------------------------------------------------------





---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: