-
A buffer overflow vulnerability exists in Microsoft’s Remote Procedure Call (RPC) implementation. A remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service.
-
Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a Denial of Service and compromise a vulnerable system, according to Secunia.1. An error in the Intel AMS2 component when processing certain messages can be exploited to cause a buffer overflow via specially crafted packets sent to TCP port 38292.…Successful exploitation of the vulnerabilities may allow execution of arbitrary code.…The vulnerabilities are reported in the following products: Symantec AntiVirus Corporate Edition Server 10.x and .Symantec System Center 10.x. A solution is to update to version 10.1 MR10.
<code>#include <stdio.h>
#include <string.h>
int main(int argc, char *argv[]){
char buffer1[8] = {'B','U','F','F','E','R','1','\0'};
char buffer2[8] = {'B','U','F','F','E','R','2','\0'};
printf("\n[ANTES] Buffer2 contem: %s\n",buffer2);
printf("[ANTES] Buffer1 contem: %s\n\n",buffer1);
strcpy(buffer2,argv[1]);
printf("[DEPOIS] Buffer2 contem: %s\n",buffer2);
printf("[DEPOIS] Buffer1 contem: %s\n\n",buffer1);
return 0;
}
</code>
Fiz o teste no Debian 5.0.3 com GCC 4.3.2-2 e funcionou corretamente.
Artigo originalmente publicado em: www.crimesciberneticos.com



