Date: Tue, 25 Jul 2000 04:50:38 +0400 (MSD) From: Solar Designer <solar@...se.com> To: announce@...ts.openwall.com Subject: OW-002-netscape-jpeg Hi, I've just published a security advisory entitled "JPEG COM Marker Processing Vulnerability in Netscape Browsers". It is available at the usual location: http://www.openwall.com/advisories/ and is on its way to Bugtraq. In addition to explaining this particular vulnerability and ways to fix it, the advisory presents a fairly generic approach to exploiting writes beyond the end of allocated heap memory. My goals were to prove that file parsers used on data files from untrusted sources are security-critical, to show the danger of integer overflows, and to present the generic approach to exploiting "heap-based overflows". Signed, Solar Designer
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.