Skip to content

Conversation

@arnerak
Copy link

@arnerak arnerak commented May 10, 2019

This buffer overflow can be exploited by specifying the -x launch parameter with a value larger than 312 bytes, as this will overwrite the return address on the stack, thus allowing arbitrary code execution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant