lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 18 May 2004 13:08:31 -0500 From: overlord_q@...mail.com To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com Subject: Re: Buffer Overflow in ActivePerl ? Oliver@...yhat.de wrote: > hi folks, > > i played around with ActiveState's ActivePerl for Win32, and crashed > Perl.exe with the following command: > > perl -e "$a="A" x 256; system($a)" > > I wonder if this bug isnt known?!? Because system() is a very common > command.... > Can anybody reproduce this? > > I put together a little advisory on my website, including version > information and a debugger output (Drwatson): > > http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt > > > PS: Due to travel activity, i will not be able to respond to mails > within the next 8 days! > > Regards, > > Oliver > > > http://www.perlmonks.org/index.pl?node_id=354145 It's hard to tell, could be either a CRT or a perl (build) error as noted in the thread. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists