[Bug 424597] Re: bwbasic buffer overflow in variable assignments

Jeremy 0xjbrown41 at gmail.com
Mon Sep 14 03:31:38 UTC 2009


Executing code on the stack and executing shells commands is completely
different, although one or the another or a combination of both can be
used as forms of exploitation. Shell commands just happens to be
something bwbasic parses in .bas files, something that is meant to
happen, and executing code on the stack by overflowing a buffer and
overwriting the return address clearly is not. I'm not saying the
environment is going to be very clear and reasonable, but that a buffer
overflow in parsing .bas files is a security issue that should be fixed.

-- 
bwbasic buffer overflow in variable assignments
https://bugs.launchpad.net/bugs/424597
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs at lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs




More information about the universe-bugs mailing list