Hi!

On Sun, Jul 27, 2008 at 7:47 PM, Scott Lovenberg
<[EMAIL PROTECTED]> wrote:
> You mean like the stack piercing attack for Windows callbacks in the
> messaging subsystem?

Oh no! that's too scary for me :)

I just thought I could change the faulting address which is saved in
stack frame....thus after returning from signal handler...code flow
jumps into certain EIP :)

ehhehe, sorry to disappoint you :D

regards,

Mulyadi.

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to [EMAIL PROTECTED]
Please read the FAQ at http://kernelnewbies.org/FAQ

Reply via email to