On Wed, Oct 30, 2013 at 7:15 PM, Reindl Harald <h.rei...@thelounge.net> wrote:
> and no, you can't imagine an attack like "hey i have a sehll now and
> try around where i can compromise your setup" - in most cases after
> a buffer overlow and such things you have *one* chance to execture
> your code before the applications crashs

No. A typical buffer overflow attack is used to either spawn a local
shell or a reverse shell using execve().
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to