No Buffer Overflow
Giorgos Keramidas
keramida at ceid.upatras.gr
Sun Oct 17 23:39:06 PDT 2004
On 2004-10-17 20:41, "Conrad J. Sabatier" <conrads at cox.net> wrote:
> On Mon, 18 Oct 2004 03:01:18 +0300, Giorgos Keramidas
> <keramida at ceid.upatras.gr> wrote:
> > On 2004-10-17 17:36, Jason Dusek <jason-dusek at uiowa.edu> wrote:
> > > I am reading an intro to shell-coding, and the following program is
> > > used as a simple example of vulnerable code: [...]
> > > When I run this code like this:
> > > 18 > vuln
> > > Segmentation fault (core dumped)
> > > In the tutorial this line:
> > > 19 > vuln `perl -e 'print "A"x256 . "BBBB" . "CCCC"'`
>
> I'm glad you replied to the OP, because the way he was showing his
> attempts to run the program, it looked like he was invoking some
> programs called "18" and "19" and redirecting their stdout to "vuln".
I assumed this was the history-number of the current command because
their difference was only 1. If the two numbers had a difference of
more than 1, I'd probably ask first.
> You must have already been familiar with the book or tutorial he was
> referring to. :-)
Not really. I was just guessing, since a lot of people use %! in their
tcsh prompt (or \! in bash).
More information about the freebsd-questions
mailing list