Metasploit mailing list archives
glibc detected *** double free or corruption
From: sebastiaan.veenstra at gmail.com (Sebastiaan Veenstra)
Date: Sat, 15 Apr 2006 15:52:52 +0200
Hi, As far as i know, the newer glibc version are using some kind of protection mechanism against malloc overflows. When the boundary information between chunks is overwritten due to a overflow, glibc will detect. I don't know a technique to bypass this mechanism. I'd be glad if someone can provide me with information about bypassing this protection mechanism. Greets, Sebastiaan Veenstra On 4/15/06, Sebastian Funk <sebastian.funk at gmail.com> wrote:
Hi, I'm trying the "apache_chunked_win32"-exploit, but I get that error after a few trys: [*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/7 ] .... *** glibc detected *** double free or corruption (!prev): 0x09570ad8 *** What does that mean? Greetings, Sebastian
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060415/23ae3f62/attachment.htm>
Current thread:
- Term-ReadLine-Gnu-1.14 Gallagher, Tim (NE) (Apr 13)
- Term-ReadLine-Gnu-1.14 H D Moore (Apr 13)
- glibc detected *** double free or corruption Sebastian Funk (Apr 15)
- glibc detected *** double free or corruption Sebastiaan Veenstra (Apr 15)
- glibc detected *** double free or corruption Pusscat (Apr 15)
- glibc detected *** double free or corruption Pusscat (Apr 15)
- glibc detected *** double free or corruption Arthur Donkers (Apr 15)
- glibc detected *** double free or corruption H D Moore (Apr 15)
- <Possible follow-ups>
- Term-ReadLine-Gnu-1.14 Gallagher, Tim (NE) (Apr 13)
- Term-ReadLine-Gnu-1.14 mmiller at hick.org (Apr 13)
- Term-ReadLine-Gnu-1.14 Gallagher, Tim (NE) (Apr 13)