ChinaUnix.net
相关文章推荐:

stack smashing detected

[code]#include #define MAXLINE 10 int getline1(char line[], int maxline); int main() { int len; char line[MAXLINE]; len = getline1(line, MAXLINE); while (len > 0) { printf("main:%d\n", len); len = getline1(line, MAXLINE); } return 0; } int getline1(char line[], int maxline) { int len = 0; int j = 0; int c; for (; (c = getchar()) != EOF && c!='\n'; ++len) { line[len]...

by bellszhu - C/C++ - 2013-04-15 15:05:43 阅读(2189) 回复(4)

相关讨论

有函数A 。 当此函数出栈时会出现栈破碎。 十分郁闷 函数有如下语句 [quote]char temp[16]; memcpy(temp, bp, len); temp[len]='\0'; fprintf(stdout, "sport char %s\n", temp);[/quote] 上面的正常 可以按字符串形势打印出端口。 [quote]info->sourceport=atoi(temp); fprintf(stdout, "sport=%d\n", info->sourceport);[/quote] info->sourceport是个UINT32型。 上...

by wangqi0021 - C/C++ - 2009-03-19 12:35:33 阅读(2017) 回复(3)

我的系统是centos 6.5 64bit, 按照一个软件的安装要求, sudo yum install alsa-lib.i686 atk.i686 cairo.i686 dbus-glib.i686 gdk-pixbuf2.i686 pango.i686 libgdk-x11-2.0.so.0 libXt.so.6 PackageKit-gtk-module.i686 libcanberra-gtk2.i686 解决了依赖关系,这个软件好使了。 但是另外一个软件的安装程序不好使了(之前没yum install这些时是好的,好像我还yum install了glibc),报错如下—— *** stack smashing ...

by jlqsczw_2007 - Linux系统管理 - 2013-12-21 08:53:04 阅读(1132) 回复(0)

代码如下: [code] #include #include int main(int argc,char *argv[]){ FILE *fp; unsigned char allinone[10]; int tmp; int t; if(argc<2){ return -1; } fp=fopen("/proc/arp_hook","wb"); if(fp==NULL){ perror("open arp_hook error"); return -1; } printf("%s\n",argv[2]); sscanf(argv[1],"%d.%d.%d.%d",&allinone[0],&allinone[1],&allinone[...

by ddvv - C/C++ - 2008-03-13 10:37:41 阅读(11853) 回复(6)

RT, kernel 和 sdk都已经编译通过了,在最后阶段的pack的时候,出现了这个错误:[code]android42]$ pack INFO: Packing for android >>> script_parse 0.9.1 >>> check sys_config line format >>> done. >>> check partition config >>> done. >>> script_parse 0.9.1 >>> check sys_config line format >>> done. >>> check mainkey unique >>> done. >>> check module rule >>> not implement yet cp /home/shim/mywork/cubie...

by yamate_520 - Linux系统管理 - 2014-01-05 16:41:23 阅读(2453) 回复(9)

下面使我程序的部分代码, char str0[10]="Data_M_"; char str1[20]="Data_acc_ang_"; char str_fd[10]; memset(str_fd,0x00,sizeof(str_fd)); char str_end[10]=".dat"; int num_fd; FILE *pid0; FILE *pid1; if((pid0=fopen("number.txt","r"))==NULL){ printf("number.txt doesn't exit!!\n"); exit(0); } fscanf(pid0,"%d",&num_fd); fclose(pid...

by fineshang - Linux环境编程 - 2009-08-03 11:04:14 阅读(1638) 回复(0)

Blackhat-Europe-2009-Fritsch-Bypassing-aslr-slides [hide] [/hide]

by 鲍鱼王子 - 下载共享 - 2009-08-11 15:57:33 阅读(1238) 回复(0)

http://linux.chinaunix.net/bbs/thread-1029867-1-2.html 本文来自ChinaUnix博客,如果查看原文请点:http://blog.chinaunix.net/u2/67110/showart_1168693.html

by wdkzdom - Linux文档专区 - 2008-09-08 10:44:37 阅读(671) 回复(0)

[code]void main() { __asm__(" jmp 0x2a # 3 bytes popl %esi # 1 byte movl %esi,0x8(%esi) # 3 bytes movb $0x0,0x7(%esi) # 4 bytes movl $0x0,0xc(%esi) # 7 bytes movl $0xb,%eax # 5 bytes movl %esi,%ebx # 2 bytes leal 0x8(%e...

by 317316abcd - Linux环境编程 - 2009-09-19 11:12:29 阅读(1321) 回复(1)

操作系统为aix5.2,sybase版本为12.5 00:00000:00615:2005/08/31 09:07:00.41 kernel stack overflow detected: limit: 0x0000000165644610, sp: 0x0000000165644a38 00:00000:00615:2005/08/31 09:07:00.41 kernel *** stack guardword corrupted. 00:00000:00615:2005/08/31 09:07:00.43 kernel pc: 0x00000001001e3a28 pcstkwalk[2]+0x80() 00:00000:00615:2005/08/31 09:07:00.43 kernel pc: 0x00000001001e38a4 ucstkge...

by guobeifen - Sybase - 2010-10-20 08:07:33 阅读(5147) 回复(6)

原本发在c版 不过好像没人感兴趣 记得有人在这里发过类似的帖子 就再厚颜在这里把幼齿的问题再问一遍吧。。。。 原文链接:http://insecure.org/stf/smashstack.html 问题是原文的最后一个也就是第四个例子: Small Buffer Overflows 我看的不是很懂 [code] exploit4.c ------------------------------------------------------------------------------ #include #define DEFAULT_OFFSET 0 #d...

by duanius - 内核源码 - 2009-05-30 14:16:01 阅读(1125) 回复(1)