Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 6 . ( 1 2 points ) : Recently, Microsoft's SQL Server was hit by the SQL Slammer worm, which exploits a known buffer

Problem 6.(12 points):
Recently, Microsoft's SQL Server was hit by the SQL Slammer worm, which exploits a known buffer
overflow in the SQL Resolution Service. Today, we'll be writing our own 213 Slammer that exploits the
vulnerability introduced in bufbomb, the executable used in your Lab 3 assignment. And as such, Gets
has the same functionality as in Lab 3 except that it strips off the newline character before storing the input
string.
Consider the following exploit code, which runs the program into an infinite loop:
infinite.o: file format elf32-1386
Disassembly of section .text:
00000000.text>:
0:,68 fc b2 ff be push $0xbfffb2fc
5: c3 ret
6: 8916 mov sesi, besi
Here is a disassembled version of the getbuf function in bufbomb, along with the values of the relevant
registers and a printout of the stack before the call to Gets ().
(gclb) disas
Dump of assembler code for function getbuf:
08048a4408048a45:08048a4708048a4a08048a5008048a5108048a5b08048a5d:08048a5e0xbffb2fc,0x000 esp 0xbffb2e0,ebp,0xbfffb308 esi Oxfffffff x20xb??0(0x00)
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions