[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt
- From: none none <justliketocode@xxxxxxxxx>
- Date: Tue, 11 Oct 2005 05:39:16 -0700 (PDT)
Can you point out where in the kernel tree this
randomization has been done? I havent seen anything on
LKML explaining this.
>Linux kernel recently incorporated a protection which
>randomizes the stack making exploitation of
>stack based overflows more difficult. I present here
>an attack which works on exploiting static
>addresses in Linux. You should be familiar with
>standard stack smashing before attempting this
>paper.
>Thank you.
__________________________________
Yahoo! Mail - PC Magazine Editors' Choice 2005
http://mail.yahoo.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/