On Wed, Oct 30, 2013 at 7:15 PM, Reindl Harald <h.reindl@xxxxxxxxxxxxx> wrote: > and no, you can't imagine an attack like "hey i have a sehll now and > try around where i can compromise your setup" - in most cases after > a buffer overlow and such things you have *one* chance to execture > your code before the applications crashs No. A typical buffer overflow attack is used to either spawn a local shell or a reverse shell using execve(). -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct