[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c3431d2e0704020726s4d4e0840xa8e3dd610a5093b3@mail.gmail.com>
Date: Mon, 2 Apr 2007 09:26:58 -0500
From: "Jason Areff" <hailtheczar@...il.com>
To: "Larry Seltzer" <Larry@...ryseltzer.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Windows .ANI LoadAniIcon Stack Overflow
On 4/2/07, Larry Seltzer <Larry@...ryseltzer.com> wrote:
>
> LS>Heap spraying implies running code in the heap,
> JA>Actually, um.. no.. it doesn't
>
> My understanding of heap spraying comes from
> http://blogs.securiteam.com/index.php/archives/638: "...SkyLined's heap
> spraying techqniue
> (http://sf-freedom.blogspot.com/2006/07/heap-spraying-internet-exploiter
> .html) (the concept of this technique is that you inject the nop +
> shellcode into the heap memory and use some method to trick the eip jump
> into that heap ..."
>
> Sure sounds like running code in the heap to me.
"Heap spraying" is filling the heap with controllable data... This is simply
allocating things in the heap. NOT running code.
You are trying to say that once you jump into that code via some exploit
(NOT part of the heap spraying technique itself) THEN you are "running code
in the heap".
JA>How do you get to be in that position? Lot's of buzzword-tossing I'd
> have to guess.
>
> Fuck you too.
>
> Larry Seltzer
> eWEEK.com Security Center Editor
> http://security.eweek.com/ <blocked::http://security.eweek.com/>
> http://blog.eweek.com/blogs/larry%5Fseltzer/
> <http://blog.eweek.com/blogs/larry_seltzer/>
> <http://blog.ziffdavis.com/seltzer>
> Contributing Editor, PC Magazine
> larryseltzer@...fdavis.com
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists