Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 28 Oct 2001 13:00:17 +0300
From:      "Yuri Muhitov" <muhitov@kostasoft.spb.ru>
To:        <freebsd-security@FreeBSD.ORG>
Subject:   BUFFER OVERFLOW EXPLOITS
Message-ID:  <2E8E747BA4D4994CB49D56AF57F1728208B295@adv.KOSTASOFT.kostasoft.spb.ru>

next in thread | raw e-mail | index | archive | help
Hi!

How does 'buffer overflow' exploit works in details?
How can attacker execute arbitrary code on attacked machine?
What about 'stack overflow' and 'changing return address' in procedure call?
Is this programming, compiler or compiling options error?
How to avoid this problem on practice (writing programs)?

Where can I read about this thing?

Sincerely yours, Yuri.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2E8E747BA4D4994CB49D56AF57F1728208B295>