Crispin Cowan <crispin@immunix.com> writes: > Thanks to Snax and the Shmoo for a better tag line: It's not the Size > of the Buffer, it's the Address of the Pointer This is not true. There are buffer overflow exploits which do not modify pointers, but other objects. The most prominent example is probably the "c c c c c..." exploit for the Solaris /bin/login vulnerability.