[HN Gopher] Unraveling Time: A Deep Dive into TTD Instruction Em...
___________________________________________________________________
Unraveling Time: A Deep Dive into TTD Instruction Emulation Bugs
Author : threat_analyst
Score : 18 points
Date : 2025-03-10 18:51 UTC (3 days ago)
(HTM) web link (cloud.google.com)
(TXT) w3m dump (cloud.google.com)
| xyzsparetimexyz wrote:
| Sadly not about transport tycoon deluxe
| nosrepa wrote:
| Thanks for saving me the extra tap!
| LegionMammal978 wrote:
| On the Linux side of things, I've found it surprising how easy it
| is to crash GDB by doing funny stuff in the inferior program.
| (E.g., fiddling with the PT_INTERP header can make it read a null
| pointer when loading the program,
| https://sourceware.org/bugzilla/show_bug.cgi?id=30663. And at
| runtime, I've gotten several crashes by playing with the
| stack/instruction pointers.)
|
| I wouldn't be surprised if some of these crashes are exploitable
| as RCEs, perhaps even through gdbserver. I'd be wary of running
| GDB on a malicious program without sandboxing both.
___________________________________________________________________
(page generated 2025-03-13 23:01 UTC)