lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 17 May 2004 22:23:56 +0200 From: "Oliver@...yhat.de" <Oliver@...yhat.de> To: full-disclosure@...ts.netsys.com Cc: bugtraq@...urityfocus.com Subject: Buffer Overflow in ActivePerl ? hi folks, i played around with ActiveState's ActivePerl for Win32, and crashed Perl.exe with the following command: perl -e "$a="A" x 256; system($a)" I wonder if this bug isnt known?!? Because system() is a very common command.... Can anybody reproduce this? I put together a little advisory on my website, including version information and a debugger output (Drwatson): http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt PS: Due to travel activity, i will not be able to respond to mails within the next 8 days! Regards, Oliver _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists