On Wed, Oct 30, 2013 at 7:15 PM, Reindl Harald <[email protected]> wrote: > and no, you can't imagine an attack like "hey i have a sehll now and > try around where i can compromise your setup" - in most cases after > a buffer overlow and such things you have *one* chance to execture > your code before the applications crashs
No. A typical buffer overflow attack is used to either spawn a local shell or a reverse shell using execve(). -- devel mailing list [email protected] https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
