Vulnerability Development mailing list archives
Buffer UNDERFLOWS: What do you know about it?
From: Julio e2fsck Cesar <e2fsck () bol com br>
Date: 10 Jan 2004 03:59:12 -0000
Hi folks,
Well, this message is about a thing I thought very intersting. I've been
talking to a friend about buffers, when our monologue stopped in a unusual
kind of behaviour and few documented: buffer underflow.
I've been thinking about it for few days, Googling, looking for papers, articles
or whatever over the internet, but there is scant material about it.
So I decided ask what you guys know about it? What can be done exploiting this kind of flaw?
As most of you know, buffer overrun explores a boundary check of arguments, overflowing a memory region, in most cases
leading to arbitrary code execution.
But what about underflows? What happens if I remove - pop() - more elements than a buffer has? Is possible to execute
arbitrary code? Memory area dumping? Does it work only for stack or is it real also for heap? Or none? There are
mechanisms to prevent underflows?
Well, I really need your expertise and skills for get out all doubts of my head about buffer underruns, once I don't
have much knowledge in this field.
I really would like to thank Gustavo Monteiro for nights we stayed up talking bullshit and having fun, also for Lucien
Rocha for our suddenly crafted monologues about computers :)
Sorry about any english mistakes.
Best regards,
Julio "e2fsck" Cesar
Recife - PE - Brazil
san dimas high school football rules
Current thread:
- Buffer UNDERFLOWS: What do you know about it? Julio e2fsck Cesar (Jan 10)
- <Possible follow-ups>
- RE: Buffer UNDERFLOWS: What do you know about it? OUAH (Jan 13)
- RE: Buffer UNDERFLOWS: What do you know about it? Chris Anley (Jan 14)
