Vulnerability Development mailing list archives
Re: Is this an off-by-one overflow?
From: spacewalker <spacewalker () altern org>
Date: Wed, 19 Feb 2003 17:59:13 +0100
[note : please answer me with a working email as i think we might continue chatting out of the list] you've probably overwritten a local pointer with a bugged strcpy. that's not an offbyone in my sense, but without more source/asm output, i couldn't say much. by my experience, i think you might have overwritten the return adress in the stack (use bt function from gdb to reveal it). to exploit it, i think you'll need some skill in overflow exploitations because it isn't really simple to exploit (you'll have to replace the AAAA into the pointer by some valid pointer so you can restore the original work of the function and then exploit it when it returns to the previous function.) Excuse me if i'm fuzzy, you had been fuzzy too :) now, do you really need to exploit it ? is it suid root on some boxes ? don't you have access to sources or to a coder to fix it (like adding "n" to the strcpy) ? It won't even replace a good analys from a security code auditer. Regards, spacewalker
Current thread:
- Is this an off-by-one overflow? exce (Feb 19)
- Re: Is this an off-by-one overflow? spacewalker (Feb 20)
- <Possible follow-ups>
- Re: Is this an off-by-one overflow? Knud Erik Højgaard (Feb 19)