Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt
From: none none <justliketocode () yahoo com>
Date: Tue, 11 Oct 2005 05:39:16 -0700 (PDT)

Can you point out where in the kernel tree this
randomization has been done? I havent seen anything on
LKML explaining this.

Linux kernel recently incorporated a protection which
randomizes the stack making exploitation of
stack based overflows more difficult. I present here
an attack which works on exploiting static
addresses in Linux. You should be familiar with
standard stack smashing before attempting this 
paper.

Thank you.


        
                
__________________________________ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault