And…we’re back!
OK, so we had a system upgrade last week, and apparently our server didn’t really appreciate it, so wololo.net was down today, but we fixed it (’cause we rock!) hopefully this won’t happen too frequently.
Oh, and, of course, the CFW from Mad Daemon was a fake, but that was quite obvious from the start, right?
important question to u wololo: Is a arithmetic overflow exploitable?
Some times, yes… I’ve seen cases when such an overflow coupled with bad mallocs could do things… but it’s not as easy as a buffer overflow from my (short) experience
I got this in psplink by hex editing the tiff crash of CoD3r.
Does that mean there´s a litle hope?
Here a picture of psplink: http://s11b.directupload.net/file/d/2072/lrg285we_jpg.htm
but it is very dificullt to controll the bytes
If you have no control on the values of either v0 or v1, probably not very useful… otherwise… well it could be interesting, but it doesn’t look like a simple hack
yes i know, =(
i´m really interesed in exploit this picture.
I do this in Hex Editor.Can u plz tell me how to load tiff files in C or ruby?
on my programm (Dev C++) it looks so: http://s10.directupload.net/file/d/2072/3g4fexi2_jpg.htm
In C:
1) install libtiff http://www.libtiff.org/
2) There should be samples in the documentation
thank u , i downloaded the setup libtiff and i installed it. But how do i use this now? If i open a tiff image in Dev C it is like before. Have i done something wrong?
Read the libtiff documentation, I cannot teach you the basics of programming 🙁
a stupid question from me. i meant something else ,but that´s now clear for me 🙂
Thank you