lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 May 2004 13:08:31 -0500
From: overlord_q@...mail.com
To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com
Subject: Re: Buffer Overflow in ActivePerl ?


Oliver@...yhat.de wrote:

> hi folks,
> 
> i played around with ActiveState's ActivePerl for Win32, and crashed 
> Perl.exe with the following command:
> 
> perl -e "$a="A" x 256; system($a)"
> 
> I wonder if this bug isnt known?!? Because system() is a very common 
> command....
> Can anybody reproduce this?
> 
> I put together a little advisory on my website, including version 
> information and a debugger output (Drwatson):
> 
>    http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt
> 
> 
> PS:  Due to travel activity, i will not be able to respond to mails 
> within the next 8 days!
> 
> Regards,
> 
> Oliver
> 
> 
> 
http://www.perlmonks.org/index.pl?node_id=354145

It's hard to tell, could be either a CRT or a perl (build) error as 
noted in the thread.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists