Showing posts with label assembly. Show all posts
Showing posts with label assembly. Show all posts
Thursday, 10 January 2013
Null Terminated String Copy
Research into a heap buffer overflow error in Windows XP version of NetApi32.dll reveals that the code is using a null terminated string copy. The patched version of the same dll shows that the copy code has been replaced by a better function that checks the size of the destination buffer.
Labels:
assembly,
buffer,
CVE2012-1852,
exploit,
internetsecurity,
it security,
Msc,
NetApi32,
overflow,
programming,
Reverse Engineering,
string copy,
virus,
Windows XP,
x86
Subscribe to:
Posts (Atom)