Code Supplement

2016-02-29  本文已影响0人  SailorARK

Thanks for your answers, according to your feedback, I knew that I should supply more code for your to help me draw the map of stack before and after buffer overflow. Now, the relevant codes are here.

First, the principle of the buffer overflow in the script is that, in the function hedwig_main, there exists a sub-function sess_get_uid which extracts cookie value from the head of HTTP and doesn’t test the length of cookie value. Then, another function sobj_get_string also extracts the cookie value without testing it’s length. The value of cookie then be used as a parameter of the function sprintf which located in 0x0040997C formatted onto the stack.
Second, I supply the code refer to the result of IDA Pro.

上一篇 下一篇

猜你喜欢

热点阅读