Vulnerability Development mailing list archives

Re: ms03-043 questions


From: "upb" <upb () email ee>
Date: Tue, 4 Nov 2003 12:31:02 +0200

Disassembling the dll and understanding the vuln might be more useful than
just
shooting in the dark with different offsets / amounts of data.

----- Original Message ----- 
From: "wirepair" <wirepair () roguemail net>
To: <vuln-dev () securityfocus com>
Sent: Monday, November 03, 2003 5:12 AM
Subject: ms03-043 questions


lo all,
I was just curious if anyone has been able to get this to execute code.
I've been playing with it the last couple of days and I've
  only managed to get invalid read attempts. I've narrowed it down to
requiring at least 584 0x14 characters (a length of 3992
appears
  to be required to cause the exception). Placement within the buffer of
the 0x14 characters does not seem to matter. Thanks for
any
information you can provide.
-wire
--
Visit Things From Another World for the best
comics, movies, toys, collectibles and more.
http://www.tfaw.com/?qt=wmf



Current thread: