Vulnerability Development mailing list archives

Re: Exploiting Buffer Overflows on Compaq Tru64 and No-Exec Stack


From: Muhammad Faisal Rauf Danka <mfrd () attitudex com>
Date: Fri, 17 May 2002 05:36:01 -0700 (PDT)

It's probably kind of a bruteforce there are plenty NULLS when it's 64bits.


Regards, 
---------
Muhammad Faisal Rauf Danka

Chief Technology Officer
Gem Internet Services (Pvt) Ltd.
web: www.gem.net.pk
voice: 92-021-111-GEMNET

Vice President
Pakistan Computer Emergency Responce Team (PakCERT)
web: www.pakcert.org

Chief Security Analyst
Applied Technology Research Center (ATRC)
web: www.atrc.net.pk
voice: 92-21-4980523 92-21-4974781 

"Great is the Art of beginning, but Greater is the Art of ending. "

------BEGIN GEEK CODE BLOCK----
Version: 3.1
GCS/CM/P/TW d- s: !a C++ B@ L$ S$ U+++ 
P+ L+++ E--- W+ N+ o+ K- w-- O- PS PE- Y- 
PGP+ t+ X R tv+ b++ DI+ D G e++ h! r+ y+
------END GEEK CODE BLOCK------


--- "helmut schmidt" <helmutsch69 () hotmail com> wrote:
Hi,

I have been testing buffer overflows on Compaq Tru64. However, all my 
examples execute code on the stack. Tru64 comes with a default 
non-executable stack.

How can one exploit a Tru64 buffer overflow without executing code on the 
stack ? I would appreciate any techniques / White papers or coding examples 
that I can use to further my understanding of these issues in a 64-bit 
environment.

Thanks in advance for any help, Helm

_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.

_____________________________________________________________
---------------------------
[ATTITUDEX.COM]
http://www.attitudex.com/
---------------------------

_____________________________________________________________
Promote your group and strengthen ties to your members with email () yourgroup org by Everyone.net  
http://www.everyone.net/?btn=tag


Current thread: