Thread: M$ JPG Vulnerability

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #6
    Registered User
    Join Date
    Apr 2004
    Posts
    210
    Buffer overruns are fun. We had to "hack" a few "bombs" and other programs in classes at the university. It's not really that complicated if you know where the vulnerability is. It requires a little assembler knowledge but you don't need to be a guru to do it.
    That's probably what makes it so dangerous. That and the fact that everybody in the windows world uses the exact same programs so a small vulnerability affects a massive amount of users.

    This is one of the assignments we had to do. It was actually a lot of fun, even though the "bomb" makes it easy as it uses a normalized stack. Only the last part of the assignment uses a random stack.
    Last edited by Nyda; 09-26-2004 at 11:00 PM.

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. Replies: 6
    Last Post: 01-01-2007, 07:36 AM
  2. Downloading and displaying a jpg file
    By maxorator in forum Windows Programming
    Replies: 13
    Last Post: 11-30-2006, 06:52 AM
  3. How Dispaly JPG images in VC++
    By darcome in forum Windows Programming
    Replies: 10
    Last Post: 10-01-2002, 01:52 AM
  4. StretchBlt and JPG
    By novacain in forum Windows Programming
    Replies: 0
    Last Post: 09-28-2001, 03:05 AM
  5. What is 'buffer overrun vulnerability' in IIS?
    By Web admin in forum Windows Programming
    Replies: 1
    Last Post: 08-16-2001, 03:33 AM