[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <OF6484EC18.BE1F5A2B-ONC1257147.0029FD1E-C1257147.002BDA7F@cajastur.es>
Date: Wed, 5 Apr 2006 09:49:14 +0200
From: jalvare7@...astur.es
To: Luigi Auriemma <aluigi@...istici.org>
Cc: vuln@...unia.com, bugs@...uritytracker.com, bugtraq@...urityfocus.com,
full-disclosure@...ts.grok.org.uk, news@...uriteam.com
Subject: Re: Buffer-overflow in Ultr@VNC 1.0.1 viewer and
server
Hello,
Thank you for the disclosure of this issue. I'd like to better understand
the extent of the problem, for which the code snippets have been very
helpful, but I still would need some help in the case of the server
vulnerability.
Could you confirm my impression that the server vulnerability can only
overflow the buffer in 3 bytes? (" --" is a C-Style string, doesn't it?).
Is there a way to exploit this for code execution, or would it be limited
to DoS?,
How could one control the result of the FormatMessage for any of those two
purpouses?
Thanks in advance.
Juan Alvarez
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists