XP/Vista IGMP Buffer Overflow — Explained 208
HalvarFlake writes "With all the hoopla about the remotely exploitable, kernel-level buffer overflow discussed in today's security bulletin MS08-0001, what is the actual bug that triggers this? The bulletin doesn't give all that much information. This movie (Flash required) goes through the process of examining the 'pre-patch' version of tcpip.sys and comparing it against the 'post-patch' version of tcpip.sys. This comparison yields the actual code that causes the overflow: A mistake in the calculation of the required size in a dynamic allocation."
well gee (Score:5, Funny)
>A mistake in the calculation of the required size in a dynamic allocation
I hope no one else makes this mistake.
Sounds like HowStuffWorks material! (Score:5, Funny)
It's just a mistake! (Score:5, Funny)
Dang it all. (Score:5, Funny)
Re:Why Windows 95 and NT 4 are enough (Score:3, Funny)
Re:Dang it all. (Score:5, Funny)
Windows is open-sores software (Score:3, Funny)
See? And they said without FOSS, this couldn't be done!
Re:Let's get the preliminary stuff out of the way. (Score:1, Funny)
Re:Dang it all. (Score:0, Funny)
I've got a little TIP for you, get the POINT?
despair.com says it best (Score:2, Funny)
Re:well gee (Score:5, Funny)
Re:Why Windows 95 and NT 4 are enough (Score:3, Funny)
Tom Smykowski: It was a "Jump to Conclusions" mat. You see, it would be this mat that you would put on the floor... and would have different CONCLUSIONS written on it that you could JUMP TO.
Michael Bolton: That's the worst idea I've ever heard in my life, Tom.
Samir: Yes, this is horrible, this idea.
Mmmm, mmmm, good! (Score:5, Funny)
But that is the primary reason for
Re:Dang it all. (Score:1, Funny)