Home page logo

bugtraq logo Bugtraq mailing list archives

Re: [Full-disclosure] Microsoft Windows XP/2003/Vista memory corruption 0day
From: Alexander Sotirov <asotirov () determina com>
Date: Thu, 21 Dec 2006 12:11:29 -0800

3APA3A wrote:
Killer{R}  assumes  the problem is in strcpy(), because it should not be
used for overlapping buffers, but at least ANSI implementation of strcpy
from  Visual  C  should be safe in this very situation (copying to lower
addresses).  May be code is different for Windows XP or vulnerability is
later in code.

We discovered this bug some time ago and were preparing an advisory when it was
publicly disclosed. Since the exploit is already public, here's my analysis of
the vulnerability:


It's a double free bug that leads to arbitrary code execution in the CSRSS process.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]