Talk:Heap overflow
![]() | Computer security: Computing Start‑class | |||||||||||||||||
|
one comment I have for this page is that it seems to imply that the only way to exploit a heap overflow is by corrupting malloc meta data, in reality any linked list will do for the pointer exchange, its often possible to exploit heap overflows even without being able to overwrite any linked list pointers by corrupting other data such as function pointers or specific data structure fields...I've written more than my share of heap overflow exploits and in my experience overwriting malloc meta data isn't even the easiest way for most bugs... --Michael Lynn
Proposal for external link
I suggest to add the following article as an external reference:
A heap of risk, Buffer overflows on the heap and how they are exploited
http://www.heise-security.co.uk/articles/74634
It is an in depth explanation of how buffer overflows occur, how they are exploited and even features a simple heap management implementation for demo purposes. The author FX is a well respected expert in this field.
Please note that I am a heise editor. So I will not add the link myself. Feel free to inform me, if this kind of suggestion is not appreciated.
193.99.145.162 08:40, 12 June 2007 (UTC) / ju (ju at heisec.de)