No Buffer Overflow

Giorgos Keramidas keramida at ceid.upatras.gr
Sun Oct 17 23:39:06 PDT 2004


On 2004-10-17 20:41, "Conrad J. Sabatier" <conrads at cox.net> wrote:
> On Mon, 18 Oct 2004 03:01:18 +0300, Giorgos Keramidas
> <keramida at ceid.upatras.gr> wrote:
> > On 2004-10-17 17:36, Jason Dusek <jason-dusek at uiowa.edu> wrote:
> > > I am reading an intro to shell-coding, and the following program is
> > > used as a simple example of vulnerable code: [...]
> > > When I run this code like this:
> > >   18 > vuln
> > >   Segmentation fault (core dumped)
> > > In the tutorial this line:
> > > 19 > vuln `perl -e 'print "A"x256 . "BBBB" . "CCCC"'`
>
> I'm glad you replied to the OP, because the way he was showing his
> attempts to run the program, it looked like he was invoking some
> programs called "18" and "19" and redirecting their stdout to "vuln".

I assumed this was the history-number of the current command because
their difference was only 1.  If the two numbers had a difference of
more than 1, I'd probably ask first.

> You must have already been familiar with the book or tutorial he was
> referring to.  :-)

Not really.  I was just guessing, since a lot of people use %! in their
tcsh prompt (or \! in bash).



More information about the freebsd-questions mailing list