diff options
author | Toni Uhlig <matzeton@googlemail.com> | 2021-02-12 03:02:32 +0100 |
---|---|---|
committer | Toni Uhlig <matzeton@googlemail.com> | 2021-02-12 03:34:35 +0100 |
commit | e3ca65c5002ae165ab54178a9c15e41222c4d64f (patch) | |
tree | f7c4cafdff8b593dd9a7fe09aed31d620eb4684c /sc-test.c | |
parent | 9b466b6a81149e0f6aa80b4d27f403753a9b1f8c (diff) |
Demolished ugly and bloated exploit.sh, hail to the new exploit.py.
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
Diffstat (limited to 'sc-test.c')
-rw-r--r-- | sc-test.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -37,7 +37,7 @@ barf(const char *msg) { int main(int argc, char **argv) { FILE *fp; - void *code; + unsigned char code[BUFSIZ]; size_t i; int arg, l, m = 15 /* max # of bytes to print on one line */; @@ -54,7 +54,7 @@ main(int argc, char **argv) { errno = 0; if (!S_ISREG(sbuf.st_mode)) barf(NULL); flen = (long) sbuf.st_size; - if (!(code = calloc(1, flen))) barf("failed to grab memory"); + if (flen > BUFSIZ) barf("file to big"); if (!(fp = fopen(argv[2], "rb"))) barf("failed to open file"); if (fread(code, 1, flen, fp) != flen) barf("failed to slurp file"); if (fclose(fp)) barf("failed to close file"); |