Usually occurs when you attempt to copy data into a buffer without checking for sufficient space, causing data to be overwritten in neighboring cells.
2
votes
0answers
143 views
Possible buffer overflow bug in std::use_facet::out()
I think I have found a buffer overflow bug in the VC++10 std::locale object. I would be grateful for second opinions as to whether I am doing something wrong.
The code below is simplified to ...
2
votes
0answers
156 views
Basic buffer overflow practice
I've been practicing some basic stack-based buffer overflow task recently
and I wrote an vulnerable program like this:
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
...
1
vote
0answers
20 views
Buffer Overflow With Stncpy Vulnerability
I'm currently in a hacking class and am having trouble overflowing a buffer and overwriting the return address. I can get to the write address, I am just having trouble formatting the return address ...
1
vote
0answers
164 views
Exploiting a string-based overflow on x86-64 with NX (DEP) and ASLR enabled
Consider the following vulnerable code/program:
#include <string.h>
int main(int argc, char *argv[]) {
char buf[16];
strcpy(buf, argv[1]);
return 0;
}
On IA-32 (x86, 32-bit) ...
1
vote
0answers
87 views
Buffer overflow when launching program with system()
I'm currently using UNIX sockets to communicate between my C++ program and Webots (a robotic simulator). However, I've noticed that after some time (1~2 hours), Webots unexpectedly shuts down, without ...
1
vote
0answers
107 views
is there anyone successfully use valgrind to check memory issues for iOS?
refer to http://alxsrg.com/?p=180 http://root42.blogspot.ru/2011/02/valgrind-checking-of-ios-programs.html and http://landonf.bikemonkey.org/code/iphone/iPhone_Simulator_Valgrind.20081224.html .
I ...
1
vote
0answers
129 views
Cleaning up stack in Buffer Overflow
I am performing a buffer overflow for educational purposes only. I have a function called that uses gets to receive input from the terminal. I want to force this function to return a specific value ...
1
vote
0answers
58 views
Generating AlephOne-style visualizations of the stack?
In the widely-read "Smashing The Stack For Fun And Profit" tutorial, Aleph One presents C code examples like this:
void function(int a, int b, int c) {
char buffer1[5];
char buffer2[10];
}
...
1
vote
0answers
183 views
Overwriting saved eip to point to stdin?
A student in my class came up with a technique for exploiting buffer overflows that I have never seen before. (Frankly, I am surprised that it works.) I am curious if (1) anyone has seen a reference ...
1
vote
0answers
739 views
BEX error on Windows Web Server 2008 R2 x64
I have built an application that causes a buffer overflow exception with the following signature on Windows Web Server 2008 R2 x64
Problem signature:
Problem Event Name: BEX
...
1
vote
0answers
161 views
.NET - Buffer overflow
I've a .NET application that is crashing a couple of times a day, in our production env, I'm running process monitor on an effected PC and its reporting buffer overflows in the following location ...
1
vote
0answers
2k views
Android SDK installation error - "no buffer space available (maximum connections reached?): recv failed
I am trying to get my environment setup to develop an android app so I downloaded the SDK (http://developer.android.com/sdk/installing.html).
After unpacking the files and running the SDK Setup.exe, ...
0
votes
0answers
27 views
Starting a new shell in a strcpy exploit
I'm learning about buffer overflows and have this vulnerable code which I'm trying to start a shell from:
#include <string.h>
void myfunction(char *arg);
int main(int argc, char **argv)
{
...
0
votes
0answers
24 views
AudioRecord failing after 48 hours
I am starting a simple audiorecord instance and reading from the buffer (10 times minbufsize) at 44.1kHz, averaging to 441 Hz and this is fine for 48 hours of recording.
Some random time after 48 ...
0
votes
0answers
33 views
Passing parameter to a function reached via a buffer overflow
I have written this simple main that I compiled with the flag -fno-stack-protector.
#include <stdio.h>
int pos;
char c = 0;
void
bof(unsigned int i)
{
fprintf(stderr, "BOF %u\n", i);
}
...