Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Buffer-overflow in Ultr () VNC 1.0.1 viewer and server
From: jalvare7 () cajastur es
Date: Wed, 5 Apr 2006 09:49:14 +0200

Hello,

Thank you for the disclosure of this issue. I'd like to better understand 
the extent of the problem, for which the code snippets have been very 
helpful, but I still would need some help in the case of the server 
vulnerability.

Could you confirm my impression that the server vulnerability can only 
overflow the buffer in 3 bytes? (" --" is a C-Style string, doesn't it?).
Is there a way to exploit this for code execution, or would it be limited 
to DoS?, 
How could one control the result of the FormatMessage for any of those two 
purpouses?

Thanks in advance.

Juan Alvarez

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]