>>>>> "Isaac" == Isaac To <[EMAIL PROTECTED]> writes:
>>>>> "Paul" == Paul Morgan <[EMAIL PROTECTED]> writes: Paul> With regard to your question 3, a buffer overflow exploit is Paul> always a stack exploit and is designed to execute arbitrary code Paul> with the called program's privilege. Isaac> But this time it is an "integer overflow", not a "buffer Isaac> overflow". The idea is that when brk() is called, the kernel Isaac> forgot to check whether this will result into the memory map Isaac> pasting the end of address space used for the processes. The Isaac> problem is that after pasting the end of the address space, it Isaac> starts to be the kernel space, mapping all the physical memory of Isaac> the computer directly. I.e., it includes all the memory of the Isaac> kernel and also all the memory of all other processes. Once you Isaac> get to this point, it just requires a little bit more imagination Isaac> before you can write to all the memory of the computer directly, Isaac> skipping all the protection mechanism of the kernel. All the "pasting" should really be "passing"... stupid me non-native English speaker... Regards, Isaac. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]