Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re: SMASHING THE STACK: PREVENTION?
From: tqbf () ENTERACT COM (Thomas H. Ptacek)
Date: Tue, 29 Apr 1997 06:58:53 -0500


What about a sort of "execXXX-wrapper"? Instead of patching the kernel,
I wonder whether it make sense to patch the C library (libc.a). In each
routine of the exec family (execvp, execl, execve...) one could add something
like:

This doesn't do anything to prevent stack overruns. A conventional stack
overrun exploit doesn't use the C library system call interface; it
duplicates it entirely in assembler.

----------------
Thomas Ptacek at EnterAct, L.L.C., Chicago, IL [tqbf () enteract com]
----------------
"If you're so special, why aren't you dead?"



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault