--- a/handouts/ho03.tex Thu Oct 08 17:06:48 2015 +0100
+++ b/handouts/ho03.tex Thu Oct 08 18:46:15 2015 +0100
@@ -375,7 +375,10 @@
\begin{figure}[p]
\lstinputlisting[language=C]{../progs/C2.c}
-\caption{A vulnerable login implementation.\label{C2}}
+\caption{A vulnerable login implementation. The use of the
+`own' \pcode{get\_line} function makes this program
+vulnerable. The developer should have used \emph{safe}
+library functions instead.\label{C2}}
\end{figure}
This kind of attack was very popular with commercial programs
@@ -432,6 +435,7 @@
\lstinputlisting[language=C,numbers=none]{../progs/o2.c}
+\noindent
While not too difficult, obtaining this string is not entirely
trivial using \pcode{gdb}. Remember the functions in C that
copy or fill buffers work such that they copy everything until