[HN Gopher] Unraveling Time: A Deep Dive into TTD Instruction Em...
       ___________________________________________________________________
        
       Unraveling Time: A Deep Dive into TTD Instruction Emulation Bugs
        
       Author : threat_analyst
       Score  : 18 points
       Date   : 2025-03-10 18:51 UTC (3 days ago)
        
 (HTM) web link (cloud.google.com)
 (TXT) w3m dump (cloud.google.com)
        
       | xyzsparetimexyz wrote:
       | Sadly not about transport tycoon deluxe
        
         | nosrepa wrote:
         | Thanks for saving me the extra tap!
        
       | LegionMammal978 wrote:
       | On the Linux side of things, I've found it surprising how easy it
       | is to crash GDB by doing funny stuff in the inferior program.
       | (E.g., fiddling with the PT_INTERP header can make it read a null
       | pointer when loading the program,
       | https://sourceware.org/bugzilla/show_bug.cgi?id=30663. And at
       | runtime, I've gotten several crashes by playing with the
       | stack/instruction pointers.)
       | 
       | I wouldn't be surprised if some of these crashes are exploitable
       | as RCEs, perhaps even through gdbserver. I'd be wary of running
       | GDB on a malicious program without sandboxing both.
        
       ___________________________________________________________________
       (page generated 2025-03-13 23:01 UTC)