<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Overflow on Shivasurya</title><link>http://shivasurya.me/categories/overflow/</link><description>Recent content in Overflow on Shivasurya</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 04 Dec 2022 00:00:00 +0000</lastBuildDate><atom:link href="http://shivasurya.me/categories/overflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>Binary Search and Hidden Overflow 🪲</title><link>http://shivasurya.me/2022/12/04/binary-search-overflow/</link><pubDate>Sun, 04 Dec 2022 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2022/12/04/binary-search-overflow/</guid><description>&lt;p>Recently I was playing with overflow vulnerabilities help of &lt;code>exploit.education&lt;/code> exercise which mostly covers basic heap, buffer overflow,
use-after-free vulnerability patterns in a contained &lt;code>qemu&lt;/code> based environment. However, I was searching for Integer overflow patterns and articles around it &amp;ldquo;how to succesfully convert a integer overflow into a remote code execution&amp;rdquo;. While reading through the vulnerability reports, I started exploring code snippets relevant to integer overflow and this blog post &lt;a href="https://ai.googleblog.com/2006/06/extra-extra-read-all-about-it-nearly.html">&lt;code>Nearly All Binary Searches and Mergesorts are Broken&lt;/code>&lt;/a> caught my eyes.&lt;/p></description></item></channel></rss>