Vulnerability Development mailing list archives
Re: Playing around with a buggy source code
From: Bluefish <11a () GMX NET>
Date: Tue, 15 Aug 2000 08:08:29 +0200
This uggly use of p and the later snprintf could possibly result coredumps which would be uggly. However you cannot very easily exploit the buffert overflow in it because the buffer is a static buffer, not on the stack.
Uh... correction, no buffer is overflowed, at least not when writing to it ;) Sorry for the typo, it's five o'clock in the night here, so I blame the typo on lack of sleep. ..:::::::::::::::::::::::::::::::::::::::::::::::::.. http://www.11a.nu || http://bluefish.11a.nu eleventh alliance development & security team
Current thread:
- Playing around with a buggy source code Bluefish (Aug 14)
- Re: Playing around with a buggy source code Bluefish (Aug 14)
- Re: Playing around with a buggy source code Bluefish (P.Magnusson) (Aug 18)
- Re: Playing around with a buggy source code Pavel Kankovsky (Aug 15)
- Re: Playing around with a buggy source code Bluefish (Aug 14)