Mukund Sivaraman wrote: > Assuming the 2nd message overflows on the stack and overwrites the > return address suitably, Once the attacker controls the instruction pointer, it's game over. -- Robert Edmonds