Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Man O Man the buffer overflow rulz...

Man O Man the buffer overflow rulz...

Scheduled Pinned Locked Moved The Lounge
csharpc++comsecurityquestion
11 Posts 6 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A Atul Dharne

    Check this link http://msnbc.com/news/707130.asp?cp1=1 Mr. Gates, exasperated by reports of security bugs in Microsoft’s products, last month issued an internal memo that called for a broad “Trustworthy Computing” initiative, which includes better training for Microsoft programmers in writing more-secure computer code. :-D It is the cliched buffer overflow again which has become a viable and foremost tool for M$ exploits eg.Netmeeting etc. It is a little tough to exploit but if you the address of the crash you can put your little exploit code to do what you like... BTW this affects the VC++.NET compiler... Atul It seems that the link feature is not working..it append the cp url also:rolleyes: ..Is it some Masterplan by CM;P bored with my sig..click here

    N Offline
    N Offline
    Nish Nishant
    wrote on last edited by
    #2

    prefix with http:// like this Nish Nish was here, now Nish has gone; He left his soul, to turn you on; Those who knew Nish, knew him well; Those who didn't, can go to hell. I like to :jig: on the Code Project Sonork ID 100.9786 voidmain www.busterboy.org

    A 1 Reply Last reply
    0
    • N Nish Nishant

      prefix with http:// like this Nish Nish was here, now Nish has gone; He left his soul, to turn you on; Those who knew Nish, knew him well; Those who didn't, can go to hell. I like to :jig: on the Code Project Sonork ID 100.9786 voidmain www.busterboy.org

      A Offline
      A Offline
      Atul Dharne
      wrote on last edited by
      #3

      Thanks Nish :-O :-O :-O ;P ;P :) :) Atul nO sIg as in pIg

      N 1 Reply Last reply
      0
      • A Atul Dharne

        Thanks Nish :-O :-O :-O ;P ;P :) :) Atul nO sIg as in pIg

        N Offline
        N Offline
        Nish Nishant
        wrote on last edited by
        #4

        Glad to be of help Nish was here, now Nish has gone; He left his soul, to turn you on; Those who knew Nish, knew him well; Those who didn't, can go to hell. I like to :jig: on the Code Project Sonork ID 100.9786 voidmain www.busterboy.org

        1 Reply Last reply
        0
        • A Atul Dharne

          Check this link http://msnbc.com/news/707130.asp?cp1=1 Mr. Gates, exasperated by reports of security bugs in Microsoft’s products, last month issued an internal memo that called for a broad “Trustworthy Computing” initiative, which includes better training for Microsoft programmers in writing more-secure computer code. :-D It is the cliched buffer overflow again which has become a viable and foremost tool for M$ exploits eg.Netmeeting etc. It is a little tough to exploit but if you the address of the crash you can put your little exploit code to do what you like... BTW this affects the VC++.NET compiler... Atul It seems that the link feature is not working..it append the cp url also:rolleyes: ..Is it some Masterplan by CM;P bored with my sig..click here

          K Offline
          K Offline
          Kannan Kalyanaraman
          wrote on last edited by
          #5

          VC++ .NET trouble is merely a compiler option which helps detecting the code which might lead to a buffer overflow, but was not properly implemented. I wonder, how can this be a potential problem. Also, the company that found out the flaw went public st. away and most see that as a cheap publiciy stunt. Nothing is fool proof.I think Nick did post about the problem here at CP :-). Cheers Kannan

          J A 2 Replies Last reply
          0
          • K Kannan Kalyanaraman

            VC++ .NET trouble is merely a compiler option which helps detecting the code which might lead to a buffer overflow, but was not properly implemented. I wonder, how can this be a potential problem. Also, the company that found out the flaw went public st. away and most see that as a cheap publiciy stunt. Nothing is fool proof.I think Nick did post about the problem here at CP :-). Cheers Kannan

            J Offline
            J Offline
            Jon Sagara
            wrote on last edited by
            #6

            Kannan Kalyanaraman wrote: I think Nick did post about the problem here at CP . Yep, right here. :) Jon Sagara What about :bob:? Sonork ID: 100.9999 jonsagara

            N 1 Reply Last reply
            0
            • J Jon Sagara

              Kannan Kalyanaraman wrote: I think Nick did post about the problem here at CP . Yep, right here. :) Jon Sagara What about :bob:? Sonork ID: 100.9999 jonsagara

              N Offline
              N Offline
              Nish Nishant
              wrote on last edited by
              #7

              Jon Sagara wrote: Yep, right here Thanks Jon. I was gonna ask for the link. Nish Nish was here, now Nish has gone; He left his soul, to turn you on; Those who knew Nish, knew him well; Those who didn't, can go to hell. I like to :jig: on the Code Project Sonork ID 100.9786 voidmain www.busterboy.org

              1 Reply Last reply
              0
              • K Kannan Kalyanaraman

                VC++ .NET trouble is merely a compiler option which helps detecting the code which might lead to a buffer overflow, but was not properly implemented. I wonder, how can this be a potential problem. Also, the company that found out the flaw went public st. away and most see that as a cheap publiciy stunt. Nothing is fool proof.I think Nick did post about the problem here at CP :-). Cheers Kannan

                A Offline
                A Offline
                Atul Dharne
                wrote on last edited by
                #8

                Kannan, thanks for the link...I should have read it but as I was with my valentine... So it was a cheap publicity stunt eh..:mad: :mad: :mad: Mwwahhh Haaaa Haaa Atul Sonork 100.13714 netdiva

                N 1 Reply Last reply
                0
                • A Atul Dharne

                  Kannan, thanks for the link...I should have read it but as I was with my valentine... So it was a cheap publicity stunt eh..:mad: :mad: :mad: Mwwahhh Haaaa Haaa Atul Sonork 100.13714 netdiva

                  N Offline
                  N Offline
                  Nish Nishant
                  wrote on last edited by
                  #9

                  Atul Dharne wrote: So it was a cheap publicity stunt eh Yup. That's exactly what it was. Mwwahh :laugh: Haaa Ha Mwwahh :laugh: Haaa Ha Mwwahh Haaa Ha Mwwahh :laugh: Haaa Ha Mwwahh :laugh: Haaa Ha Mwwahh Haaa Ha Mwwahh :laugh: Haaa Ha Mwwahh :laugh: Haaa Ha Mwwahh Haaa Ha Nish Nish was here, now Nish has gone; He left his soul, to turn you on; Those who knew Nish, knew him well; Those who didn't, can go to hell. I like to :jig: on the Code Project Sonork ID 100.9786 voidmain www.busterboy.org

                  1 Reply Last reply
                  0
                  • A Atul Dharne

                    Check this link http://msnbc.com/news/707130.asp?cp1=1 Mr. Gates, exasperated by reports of security bugs in Microsoft’s products, last month issued an internal memo that called for a broad “Trustworthy Computing” initiative, which includes better training for Microsoft programmers in writing more-secure computer code. :-D It is the cliched buffer overflow again which has become a viable and foremost tool for M$ exploits eg.Netmeeting etc. It is a little tough to exploit but if you the address of the crash you can put your little exploit code to do what you like... BTW this affects the VC++.NET compiler... Atul It seems that the link feature is not working..it append the cp url also:rolleyes: ..Is it some Masterplan by CM;P bored with my sig..click here

                    C Offline
                    C Offline
                    Christopher Lord
                    wrote on last edited by
                    #10

                    Note that the buffer overflow protection is no replacement for designing your code properly in the first place. MS's (brand new) C++ stack-guard compiler option should not be the first line of defence against buffer overflows, it should be the last. This was blown way out of proportion by the group that first discovered this. This expoit does not break already strong code. Simply, if you have code with a raw buffer, the stack-guard is not 100% effective.

                    D 1 Reply Last reply
                    0
                    • C Christopher Lord

                      Note that the buffer overflow protection is no replacement for designing your code properly in the first place. MS's (brand new) C++ stack-guard compiler option should not be the first line of defence against buffer overflows, it should be the last. This was blown way out of proportion by the group that first discovered this. This expoit does not break already strong code. Simply, if you have code with a raw buffer, the stack-guard is not 100% effective.

                      D Offline
                      D Offline
                      David Wulff
                      wrote on last edited by
                      #11

                      CLaW wrote: Note that the buffer overflow protection is no replacement for designing your code properly in the first place. I was hoping someone would say this sooner or later. ________________ David Wulff http://www.davidwulff.co.uk Sonork ID: 100.9977 Dave Contents of my clipboard: Barclays Visa Connect - 4936-3503-2 -- sh*t, I'd better edit the rest out...

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups