Vulnerability Development mailing list archives
Re: understanding buffer overflows
From: 3APA3A <3APA3A () SECURITY NNOV RU>
Date: Thu, 1 Nov 2007 15:39:11 +0300
Dear secacc7 () hotmail com, main() function may actually never return, depending on C compiler implementation. Try it with different function. --Wednesday, October 31, 2007, 5:36:22 PM, you wrote to vuln-dev () securityfocus com: shc> void main() shc> { shc> char buffer[10]; shc> char COPY[]="AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..."; shc> strcpy((char *)buffer,(char *)COPY); shc> } shc> k, this works very well, i got a core dump and have startet shc> gdb. but in the output from "info all" was eip not overwritten -- ~/ZARAZA http://securityvulns.com/
Current thread:
- Re: understanding buffer overflows 3APA3A (Nov 01)
- <Possible follow-ups>
- Re: understanding buffer overflows adimitro (Nov 01)
- Re: Re: understanding buffer overflows ma (Nov 02)
- Re: Re: understanding buffer overflows secacc7 (Nov 02)
- Re: understanding buffer overflows Ben Petering (Nov 05)
- Re: understanding buffer overflows Chris Eagle (Nov 05)