The implicit function __strcpy_chk() call
Posted
by Summer_More_More_Tea
on Stack Overflow
See other posts from Stack Overflow
or by Summer_More_More_Tea
Published on 2010-04-04T05:47:56Z
Indexed on
2010/04/04
5:53 UTC
Read the original article
Hit count: 216
stackoverflow
Hi everyone:
I'm now performing a stack buffer overflow attack test on my own PC( Ubuntu 9.10, gcc-4.4.1 ) based on the article http://www.tenouk.com/Bufferoverflowc/Bufferoverflow4.html. Yet I haven't achieved the goal. Each time a segfault is thrown accompanied with some error informaiton.
I compile the source code, and wanna get further information using objdump. Function __strcpy_chk is invoked in the assembly code dumped out, and it's said that "The __strcpy_chk() function is not in the source standard; it is only in the binary standard." Does this the mechanism a compiler employed to protect runtime stack? To finish my test, how can I bypass the protection?
Regards.
© Stack Overflow or respective owner