Vulnerability Development mailing list archives
remote exploit
From: jim () GARRISON COM (Jim Stickley)
Date: Fri, 7 Jul 2000 16:53:45 -0700
Hello, I am working on an exploit right now and have run into a small problem. The exploit is a remote buffer overflow and I am able to push my source on the stack without any trouble. My code ends up in a segment something like 0x111111. Now, here is the hard part. When I go to set the execution to point to my code, it will not accept 0x111111 instead it insists its larger 0x11111111. I can't send it a null so sending \x00\x11\x11\x11 will not work. Does anyone know of a way around this? Thanx -Jim
Current thread:
- Re: BitchX /ignore bug, (continued)
- Re: BitchX /ignore bug Arturo Busleiman (Jul 07)
- Re: BitchX /ignore bug Crispin Cowan (Jul 07)
- Re: BitchX /ignore bug Hogenberg, Richard (Jul 07)
- Re: BitchX /ignore bug Bluefish (Jul 07)
- Re: BitchX /ignore bug Schlachter, Jake (Jul 07)
- Re: BitchX /ignore bug Bluefish (Jul 08)
- Re: BitchX /ignore bug Christofer C. Bell (Jul 08)
- Re: BitchX /ignore bug Erich Meier (Jul 11)
- Re: BitchX /ignore bug Ron DuFresne (Jul 07)
- Re: BitchX /ignore bug Juan M. Courcoul (Jul 07)
- remote exploit Jim Stickley (Jul 07)
- Re: remote exploit Bluefish (Jul 08)
- Re: remote exploit Gerardo Richarte (Jul 10)
- Re: BitchX /ignore bug Matthew S. Hallacy (Jul 06)
- Updated Default Account Database Eric Knight (Jul 06)
- Re: Updated Default Account Database Jesus D. Muz@oz Largo (Jul 12)
- Re: Updated Default Account Database Nathan Einwechter (Jul 12)
- some things to play with Firstname Lastname (Jul 13)
- Re: some things to play with Vladimir Dubrovin (Jul 14)
- Re: some things to play with Firstname Lastname (Jul 14)
- Re: some things to play with Vladimir Dubrovin (Jul 17)