March 24, 2004

Analysis of the Exploitation Process

A quick write-up by Steven Hill of Covert Systems Research on several types of vulnerabilities in programs written in C and similar languages - stack/heap/function pointer overwrite, format string exploitation, return-to-libc. Announced in Steven's message to the vuln-dev mailing list.

Posted by roam at 10:12 AM