> Target address range is 0x22000000 to 0x2203fff (SRAM)

The second number is 0x22003FFF or 0x2203FFF0? A digit is missing (am I wrong?)

Well, there's a problem if the address start with 0x2200 because,
yeah, this is the code for "... and this will stop the parsing of the
link and so the shellcode doesn't get copied into memory and won't
cause the overflow (even if I'm not sure of this).
An alternative solution could be to find some place in the memory
where there's a branch instruction to this location and place its
address in the payload of the exploit, but I don't think we'll ever
find an instruction of that kind (Jump into stack isn't common).

Also, can someone report what was written on IRC for people like me
that weren't connected? Thank you.

Paolo

_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to