diff -r fb0c844a26cf -r 92c49c160b24 handouts/ho03.tex --- a/handouts/ho03.tex Thu Oct 08 17:06:48 2015 +0100 +++ b/handouts/ho03.tex Thu Oct 08 18:46:15 2015 +0100 @@ -375,7 +375,10 @@ \begin{figure}[p] \lstinputlisting[language=C]{../progs/C2.c} -\caption{A vulnerable login implementation.\label{C2}} +\caption{A vulnerable login implementation. The use of the +`own' \pcode{get\_line} function makes this program +vulnerable. The developer should have used \emph{safe} +library functions instead.\label{C2}} \end{figure} This kind of attack was very popular with commercial programs @@ -432,6 +435,7 @@ \lstinputlisting[language=C,numbers=none]{../progs/o2.c} +\noindent While not too difficult, obtaining this string is not entirely trivial using \pcode{gdb}. Remember the functions in C that copy or fill buffers work such that they copy everything until