Re: $HOME/.local/bin in $PATH

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Oct 30, 2013 at 7:15 PM, Reindl Harald <h.reindl@xxxxxxxxxxxxx> wrote:
> and no, you can't imagine an attack like "hey i have a sehll now and
> try around where i can compromise your setup" - in most cases after
> a buffer overlow and such things you have *one* chance to execture
> your code before the applications crashs

No. A typical buffer overflow attack is used to either spawn a local
shell or a reverse shell using execve().
-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct





[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux