Next | Classic Unix Security Problems | 23 |
Consider a C program in which function a calls function b
a writes the appropriate return address onto a stack
then writes b's arguments onto the stack
Then transfers control (a la goto) to b
b acquires its arguments
later acquires return address
eventually transfers control back to a
Next | Copyright © 2005 M. J. Dominus |