> Target address range is 0x22000000 to 0x2203fff (SRAM) The second number is 0x22003FFF or 0x2203FFF0? A digit is missing (am I wrong?)
Well, there's a problem if the address start with 0x2200 because, yeah, this is the code for "... and this will stop the parsing of the link and so the shellcode doesn't get copied into memory and won't cause the overflow (even if I'm not sure of this). An alternative solution could be to find some place in the memory where there's a branch instruction to this location and place its address in the payload of the exploit, but I don't think we'll ever find an instruction of that kind (Jump into stack isn't common). Also, can someone report what was written on IRC for people like me that weren't connected? Thank you. Paolo _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
