Program received signal SIGSEGV, Segmentation fault.0x00007fffffffd9a0 in ?? ()
0x7fffffffd990: 0x00007fffffffdac8 0x00000002000000000x7fffffffd9a0: 0x9090909090909090 0x90909090909090900x7fffffffd9b0: 0x9090909090909090 0x90909090909090900x7fffffffd9c0: 0x9090909090909090 0x48c03190909090900x7fffffffd9d0: 0x978cd091969dd1bb 0x995f5453dbf748ff0x7fffffffd9e0: 0x050f3bb05e545752 0x00007fffffffd9a00x7fffffffd9f0: 0x0000000000000000 0x00007fffffffdac80x7fffffffda00: 0x00000002f7ffcca0 0x00000000004005660x7fffffffda10: 0x0000000000000000 0x28f3adbb077806390x7fffffffda20: 0x0000000000400470 0x00007fffffffdac00x7fffffffda30: 0x0000000000000000 0x00000000000000000x7fffffffda40: 0xd70c52c4bff80639 0xd70c427ea3c806390x7fffffffda50: 0x00007fff00000000 0x00000000000000000x7fffffffda60: 0x0000000000000000 0x00000000004006200x7fffffffda70: 0x00007ffff7de7ab0 0x00007ffff7de77cb0x7fffffffda80: 0x0000000000000000 0x00000000000000000x7fffffffda90: 0x0000000000400470 0x00007fffffffdac00x7fffffffdaa0: 0x0000000000000000 0x00000000004004990x7fffffffdab0: 0x00007fffffffdab8 0x000000000000001c0x7fffffffdac0: 0x0000000000000002 0x00007fffffffdef60x7fffffffdad0: 0x00007fffffffdf07 0x00000000000000000x7fffffffdae0: 0x00007fffffffdf56 0x00007fffffffdf6b0x7fffffffdaf0: 0x00007fffffffdf76 0x00007fffffffdf88
rax 0x0 0rbx 0x0 0rcx 0x7fffffad 2147483565rdx 0x7ffff7dd3780 140737351858048rsi 0x1 1rdi 0x1 1rbp 0x50f3bb05e545752 0x50f3bb05e545752rsp 0x7fffffffd9f0 0x7fffffffd9f0r8 0x0 0r9 0x53 83r10 0x4e 78r11 0x246 582r12 0x400470 4195440r13 0x7fffffffdac0 140737488345792r14 0x0 0r15 0x0 0rip 0x7fffffffd9a0 0x7fffffffd9a0eflags 0x10206 [ PF IF RF ]cs 0x33 51ss 0x2b 43ds 0x0 0es 0x0 0fs 0x0 0
Comprueba el contenido del buffer, byte por byte, a ver si es lo que esperas...
¿¿Lo has compilado con los flags de permitir ejecucion de pila??
gcc -o vuln vuln.c -fno-stack-protector
gcc -o vuln vuln.c -fno-stack-protector -z execstack
[email protected] $ echo "0" > /proc/sys/kernel/randomize_va_space