Skip to content

Conversation

arnerak
Copy link

@arnerak arnerak commented May 10, 2019

This buffer overflow can be exploited by specifying the -x launch parameter with a value larger than 312 bytes, as this will overwrite the return address on the stack, thus allowing arbitrary code execution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant