Vulnerability Development mailing list archives
Re: ms03-043 questions
From: "upb" <upb () email ee>
Date: Tue, 4 Nov 2003 12:31:02 +0200
Disassembling the dll and understanding the vuln might be more useful than just shooting in the dark with different offsets / amounts of data. ----- Original Message ----- From: "wirepair" <wirepair () roguemail net> To: <vuln-dev () securityfocus com> Sent: Monday, November 03, 2003 5:12 AM Subject: ms03-043 questions
lo all, I was just curious if anyone has been able to get this to execute code.
I've been playing with it the last couple of days and I've
only managed to get invalid read attempts. I've narrowed it down to
requiring at least 584 0x14 characters (a length of 3992
appears to be required to cause the exception). Placement within the buffer of
the 0x14 characters does not seem to matter. Thanks for
any information you can provide. -wire -- Visit Things From Another World for the best comics, movies, toys, collectibles and more. http://www.tfaw.com/?qt=wmf
Current thread:
- ms03-043 questions wirepair (Nov 03)
- Re: ms03-043 questions Adik (Nov 03)
- Re: ms03-043 questions upb (Nov 05)
- <Possible follow-ups>
- Re[2]: ms03-043 questions einstein, dhtm (Nov 05)
- Re[3]: ms03-043 questions Adik (Nov 06)
- Re: Re[2]: ms03-043 questions Dave Korn (Nov 12)