Security Basics mailing list archives
Re: buffer overflow
From: "Bill Loren" <lorenb2 () bezeqint net>
Date: Wed, 23 Jul 2003 20:01:09 +0200
But isn't the "Smashing the stack for fun or profit" paper terribly outdated ? Not that any buffer overflow concept has changed, but there are plenty of bytes alignments and allocation problems in its 8 (?) years old examples. B ----- Original Message ----- From: "Janus N. Tøndering" <janus () bananus dk> To: <Sánchez Sanz>; <Javier" <jssanz () indra es>> Cc: <security-basics () securityfocus com> Sent: Wednesday, July 23, 2003 6:05 PM Subject: Re: buffer overflow On Wed, 2003-07-23 at 12:04, "Sánchez Sanz, Javier" wrote:
Hello, I'm new in this forum, and I would like to read something for
beginers (as a FAQ whih are you trying to do). But meanwhile, I would like to know how a buffer overflow affects to vulnerability (in ports and so on). I know what a socket, a UPD or TPC packet is.
Thanks, Javi
You are probably looking for this: http://www.phrack.org/phrack/49/P49-14 Janus -- Janus N. Tøndering <janus () bananus dk> --------------------------------------------------------------------------- ---------------------------------------------------------------------------- --------------------------------------------------------------------------- ----------------------------------------------------------------------------
Current thread:
- Re: buffer overflow Janus N. (Jul 23)
- Re: buffer overflow Bill Loren (Jul 24)
- <Possible follow-ups>
- Re: buffer overflow Lim Ghee Lam (Jul 24)