[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Re: Buffer-overflow in Ultr@VNC 1.0.1 viewer and server
- To: Luigi Auriemma <aluigi@xxxxxxxxxxxxx>
- Subject: [Full-disclosure] Re: Buffer-overflow in Ultr@VNC 1.0.1 viewer and server
- From: jalvare7@xxxxxxxxxxx
- Date: Wed, 5 Apr 2006 09:49:14 +0200
Hello,
Thank you for the disclosure of this issue. I'd like to better understand
the extent of the problem, for which the code snippets have been very
helpful, but I still would need some help in the case of the server
vulnerability.
Could you confirm my impression that the server vulnerability can only
overflow the buffer in 3 bytes? (" --" is a C-Style string, doesn't it?).
Is there a way to exploit this for code execution, or would it be limited
to DoS?,
How could one control the result of the FormatMessage for any of those two
purpouses?
Thanks in advance.
Juan Alvarez
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/