Vulnerability Development mailing list archives
Re: regarding phrack49's stack smashing tutorial
From: sirsyko () MERGIOO ISHIBOO COM (Precious Roy)
Date: Sat, 13 May 2000 12:57:07 -0500
On Sat, May 13, 2000 at 08:56:41PM +0200, Christian Hammers wrote:
Hello list I'm learning about stack overflows from Aleph's article in Phrack #49. Now I wonder about the following sentences: "The answer is that for every program the stack will start at the same address." Why does it and more specific *where*? I wrote some test programs and saw that is always 0xbffff6c6 +- 0xff. But it changes sometimes. What is so special about this 0xbffffffff address and by the way this address never fits into my 64M memory.... !
You are dealing with virtual memory, not direct memory locations. The address of your stack may change depending on how your program is called. For instance, if you write your exploit to do run with defaults, or with arguments that change the said defaults, your program will have a different address for the stack. Also, if you write your program, then later add a new variable and compile it again, the address of the stack will change when the new program is run. A good unix internals book should explain this better. Try Advanced Programming in the Unix Environment by Stevens, or any other good unix internals book. A quick websearch may have good results as well.
If anybody know other documents which explains buffer overflows I would appreciate any information.
www.securityfocus.com and click on library, then click on vulnerabilities, ten click on buffer overflows. <ss>
Current thread:
- Re: WSCRIPT.EXE , CSCRIPT.EXE replacement for *.vbs Knud Erik Højgaard (Apr 14)
- <Possible follow-ups>
- Re: WSCRIPT.EXE , CSCRIPT.EXE replacement for *.vbs Harmer, Mike (May 12)
- regarding phrack49's stack smashing tutorial Christian Hammers (May 13)
- Re: regarding phrack49's stack smashing tutorial Precious Roy (May 13)
- Re: regarding phrack49's stack smashing tutorial Bluefish (May 13)
- QPOP2.5* exploit ?? Ryan Sweat (May 14)
- Re: QPOP2.5* exploit ?? H D Moore (May 14)
- Re: QPOP2.5* exploit ?? jms (May 13)
- Napster Fix optik (May 14)
- Re: QPOP2.5* exploit ?? Maurycy Prodeus (May 15)
- Re: QPOP2.5* exploit ?? jms (May 14)
- Re: QPOP2.5* exploit ?? Eric LeBlanc (May 15)
- regarding phrack49's stack smashing tutorial Christian Hammers (May 13)
- hi sparc qpop info sp00n () GMX DE (May 14)
- Re: QPOP2.5* exploit ?? typo () INFERNO TUSCULUM EDU (May 14)