DeepRed targetted CodeJitsu running YAN01_00016 in round 94.
Reading from protected address: 0x4347c000
0xb7fff0a0 : int 128Execution control corruption via return (return to: 0xbaaaaff8).
Tracing data from eip: 0x8048e4c tracing source of memory: 0xbaaaaff8 (value: 0xbaaaafb4)
0x804956a : receive syscall (return)Execution of memory occurred that was not part of the initial text sections or an executably allocated page.
Tracing data from eip: 0xbaaaafb4 tracing source of memory: 0xbaaaafb4 (value: 0x438ddb31)
0x804956a : receive syscall (return)Curated by Lunge Technology, LLC. Questions or comments? Send us email