[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

tiffsplit (libtiff <= 3.8.2) Local Stack Buffer Overflow PoC

Author
nitr0us
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-7533
Category
local exploits
Date add
25-05-2006
Platform
linux
============================================================
tiffsplit (libtiff <= 3.8.2) Local Stack Buffer Overflow PoC
============================================================


# tiffsplit (libtiff <= 3.8.2) local stack buffer overflow PoC

tiffsplit from libtiff (http://www.remotesensing.org/libtiff/)
is vulnerable to a bss-based and stack-based overflow, but, I just
wrote the concept c0de for stack-based b0f 'cause I don't know how
to take advantage of the overwritten bss data (after the overflow,
that data is overwritten again correctly by a program' function).

.bss section is in higher addresses than .dtors section, so, we
can't hijack .dtors to....

PoC: 05262006-tiffspl33t.tar.gz

back: http://inj3ct0r.com/sploits/307.zip





#  0day.today [2024-11-15]  #