Full Disclosure mailing list archives
http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt
From: none none <justliketocode () yahoo com>
Date: Tue, 11 Oct 2005 05:39:16 -0700 (PDT)
Can you point out where in the kernel tree this randomization has been done? I havent seen anything on LKML explaining this.
Linux kernel recently incorporated a protection which randomizes the stack making exploitation of stack based overflows more difficult. I present here an attack which works on exploiting static addresses in Linux. You should be familiar with standard stack smashing before attempting this paper.
Thank you.
__________________________________
Yahoo! Mail - PC Magazine Editors' Choice 2005
http://mail.yahoo.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt Micheal Turner (Oct 11)
- <Possible follow-ups>
- http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt none none (Oct 11)
- Re: [Full-disclosure] http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt Eduardo Tongson (Oct 11)
