lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: volker.tanger at detewe.de (Volker Tanger)
Subject: Re: Buffer Overflow in ActivePerl?

On Tue, 18 May 2004 11:03:40 +0200 Axel Beckert <beckert@...s.de> wrote:
> Am Mon, May 17, 2004 at 10:23:56PM +0200, Oliver@...yhat.de schrieb:
> > i played around with ActiveState's ActivePerl for Win32, and crashed
> > Perl.exe with the following command:
> > 
> > perl -e "$a="A" x 256; system($a)"

Your command line parameters for perl.exe are probably:
	1.)	-e
	2.)	"$a="
	3.)	A
	4.)	" x 256; system($a)"

Thus are you sure you get $A set with 256 "A"s?

Are you crashing system() or perl.exe's command line parser?

Please define "crashed".

Bye

Volker Tanger
ITK Security


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ