Research Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
Program 1
A simple program containing read exception vulnerability.
(1) char ⋆message = Hello World!; | (2) void vulnerable_function() | (3) char ⋆tmp; | (4) tmp = message; | (5) char buff[128]; | (6) read(0,buf,256); | (7) printf(%s,tmp); //The location read exception occur | (8) printf(You have passed successfully!); | (9) } |
|