In this paper we are going to describe a kind of vulnerability that
is known in the literature but also poor documented. In fact, the
problem that is going to be analyzed can be reduced to a
memory adjacent overwriting attack but usually it is obtained
exploiting the last null byte of a buffer, hence we are going to
show that the same result is still possible writing behind a
buffer, under certain conditions. To fully understand the subject
of this article it's necessary to describe the memory organization1
of running processes, then the memory adjacent overwrite
attack, concluding with our analysis.
Read PDF
The link for this article located at Angelo Rosiello is no longer available.