4 May
2008
4 May
'08
09:40
David C. Rankin escribió:
int main(int argc, char *argv[]) { char *endptr, *str, newstr[20];
strcpy(newstr,argv[1]);
^^ ./a.out 23000000000000000000000000000000000000 *** stack smashing detected ***: ./a.out terminated classic buffer overflow.. do not use strcpy() it is evil. see https://buildsecurityin.us-cert.gov/daisy/bsi-rules/home/g1/848.html -- "Progress is possible only if we train ourselves to think about programs without thinking of them as pieces of executable code.” - Edsger W. Dijkstra Cristian Rodríguez R. Platform/OpenSUSE - Core Services SUSE LINUX Products GmbH Research & Development http://www.opensuse.org/