From owner-freebsd-security Sun Oct 28 2:58:57 2001 Delivered-To: freebsd-security@freebsd.org Received: from holmes.infopro.spb.su (holmes.infopro.spb.su [195.242.2.2]) by hub.freebsd.org (Postfix) with ESMTP id 0895137B406 for ; Sun, 28 Oct 2001 02:58:54 -0800 (PST) Received: from barrymore.peterlink.ru (barrymore.peterlink.ru [195.242.2.8]) by holmes.infopro.spb.su (8.9.1/8.9.1) with ESMTP id NAA20912 for ; Sun, 28 Oct 2001 13:58:52 +0300 (MSK) Received: from kostasoft.spb.ru (spb-4-132.dialup.peterlink.ru [195.242.19.132]) by barrymore.peterlink.ru (8.9.1/8.9.1) with ESMTP id NAA16292 for ; Sun, 28 Oct 2001 13:58:51 +0300 (MSK) Received: from adv2 [192.168.0.4] by kostasoft [127.0.0.1] with SMTP (MDaemon.v2.84.R) for ; Sun, 28 Oct 2001 13:00:18 +0300 Reply-To: From: "Yuri Muhitov" To: Subject: BUFFER OVERFLOW EXPLOITS Date: Sun, 28 Oct 2001 13:00:17 +0300 Message-ID: <2E8E747BA4D4994CB49D56AF57F1728208B295@adv.KOSTASOFT.kostasoft.spb.ru> MIME-Version: 1.0 Content-Type: text/plain; charset="koi8-r" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook CWS, Build 9.0.2416 (9.0.2911.0) X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200 Importance: Normal X-MDaemon-Deliver-To: freebsd-security@FreeBSD.ORG X-Return-Path: muhitov@kostasoft.spb.ru Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Hi! How does 'buffer overflow' exploit works in details? How can attacker execute arbitrary code on attacked machine? What about 'stack overflow' and 'changing return address' in procedure call? Is this programming, compiler or compiling options error? How to avoid this problem on practice (writing programs)? Where can I read about this thing? Sincerely yours, Yuri. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message