[Dshield] The end of buffer overrun vulns?

John Hardin johnh at aproposretail.com
Fri Jan 9 16:56:45 GMT 2004


On Fri, 2004-01-09 at 05:18, Pete Cap wrote:
> Saw this just this morning...
> Thoughts?
> http://zdnet.com.com/2100-1105_2-5137832.html

Linux and several other unixish OSes have had non-executable-stack
options for many years (google for Solar Designer). There are also
methods for detecting buffer overflow attempts (see StackGuard from
Immunix).

It raises the bar a bit, but does not solve many popular attack vectors.

Also, there are some programs that *rely* on an executable stack (see
"gcc trampolines" I believe) so it's not that straightforward to
implement, either.

--
John Hardin  KA7OHZ                           
Internal Systems Administrator/Guru               voice: (425) 672-1304
Apropos Retail Management Systems, Inc.             fax: (425) 672-0192
-----------------------------------------------------------------------
 If you smash a computer to bits with a mallet, that appears to count
 as encryption in the state of Nevada.
                                               - CRYPTO-GRAM 12/2001
-----------------------------------------------------------------------




More information about the list mailing list