A forum for reverse engineering, OS internals and malware analysis 

Ask your beginner questions here.
 #14485  by listito
 Fri Jul 06, 2012 3:15 pm
This is a very interesting vulnerability i'd like to talk about, we can exploit it from ring3 calling syscall from a non canonical address, but what i do not understand is what really happens when #GP(0) is executed, how can we control execution flow? I haven't seen any much information in intel manuals :?
 #14498  by everdox
 Sat Jul 07, 2012 5:26 am
well that would be INT 0Dh. general protection violations are handled as faults.

in so many words then: KiUserExceptionDispatcher would then invoke your exception handlers (if any).
 #14511  by listito
 Sat Jul 07, 2012 9:05 pm
well, it looks like its not possible to allocate a virtual page with the address above 0x7fffffa0000