funsec mailing list archives
Re: ASLR: Address Space Layout Randomization
From: Peter Kosinar <goober () nuf ksp sk>
Date: Wed, 31 May 2006 23:26:48 +0200 (CEST)
"So what is ASLR? In short, when you boot a Windows Vista Beta 2 computer, we load system code into different locations in memory. This helps defeat a well-understood attack called "return-to-libc", where exploit code
Do I read this correctly? Does it really mean that one piece of code (e.g. kernel32.dll) is at the same place for all applications and it'll remain there till the next reboot?
Or am I missing something? :-) Peter -- [Name] Peter Kosinar [Quote] 2B | ~2B = exp(i*PI) [ICQ] 134813278 _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- ASLR: Address Space Layout Randomization Fergie (May 31)
- Re: ASLR: Address Space Layout Randomization Drsolly (May 31)
- Re: ASLR: Address Space Layout Randomization Valdis . Kletnieks (May 31)
- Re: ASLR: Address Space Layout Randomization Peter Kosinar (May 31)
- Re: ASLR: Address Space Layout Randomization Alexander Sotirov (May 31)
- <Possible follow-ups>
- Re: ASLR: Address Space Layout Randomization Fergie (May 31)
- Re: ASLR: Address Space Layout Randomization Drsolly (May 31)