Vulnerability Development mailing list archives
Re: Why doesnt work?
From: Vade 79 <v9 () fakehalo deadpig org>
Date: 10 Oct 2003 09:42:48 -0000
In-Reply-To: <200310071356.PAA26163 () fedro2 ugr es> overflowing this example program does not follow the same rules as a "standard stack overflow". as it is not inside a sub-function, and is overflowing in main(){}...
// foo.c, vuln proggy // compile gcc -o foo foo.c // #include <stdio.h> #include <string.h> main (int argc,char **argv){ char buffer[1024]; if (!argc) { fprintf(stdout,"No argument found."); exit(-1); } strcpy(buffer,argv[1]); }
Current thread:
- Why doesnt work? BORJA RUIZ CASTRO MORON (Oct 08)
- Re: Why doesnt work? Daniel Bartlett (Oct 09)
- <Possible follow-ups>
- Re: Why doesnt work? Vade 79 (Oct 10)