blob: 698af76d741d3adda46922fec0424439a59555f0 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
|
/*
* Sample vulnerable program for HP-UX buffer overflows case study
*/
#include <stdio.h>
#include <stdlib.h>
unsigned long get_sp(void)
{
__asm__("copy %sp,%ret0 \n");
}
void baz(char *argument) {
char badbuf[200];
printf("badbuf ptr is: %p\n",badbuf);
strcpy(badbuf,argument);
}
void foo(char *arg) {
baz(arg);
}
int main(int argc, char **argv) {
char *param;
printf("vuln stack is: 0x%X\n",get_sp());
param=getenv("VULNBUF");
foo(param);
return 0;
}
|