Vulnerability Development mailing list archives
RE: quick question
From: "Adam Gilmore" <vuln () optusnet com au>
Date: Tue, 12 Aug 2003 00:00:32 +1000
Return-into-libc is probably your best bet, similar to the way you'd exploit something with non-exec stacks. Not many other options .. if you can control heap data you might be able to return into that. -----Original Message----- From: Cryptic_Phreak . [mailto:pondermate () hotmail com] Sent: Monday, 11 August 2003 2:03 AM To: vuln-dev () securityfocus com Subject: quick question I'm not sure if this has been asked before by anyone; but how do you exploit a stack overflow with a random stackbase? I've read bit of return-into-libc, is that what must be used? _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail
Current thread:
- quick question Cryptic_Phreak . (Aug 10)
- RE: quick question Adam Gilmore (Aug 11)