Vulnerability Development mailing list archives

Re: problem to exploit a stack overflow


From: Valdis.Kletnieks () vt edu
Date: Mon, 23 May 2005 17:23:58 -0400

On Sun, 22 May 2005 18:20:35 -0000, migalo digalo said:
hi all,

first post  :-D

ok,ok i am trying to exploit an example of stack overflow vunerable prog:

in fact it work till the execution of the shellcode ,precisely the
decode stage,so we get
[+] eip <= RET_ADDRESS
[+] jump esp
[+] begin the shellcode execution
[-] acces violation,in the decode stage:-x

You aren't trying to do this on a system that has a non-exec stack?

Also, it would help enormously if you were able to identify what ASM instruction
caused the access violation, and what the registers contained at the time....

Attachment: _bin
Description:


Current thread: