Full Disclosure mailing list archives
http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt
From: none none <justliketocode () yahoo com>
Date: Tue, 11 Oct 2005 05:39:16 -0700 (PDT)
Can you point out where in the kernel tree this randomization has been done? I havent seen anything on LKML explaining this.
Linux kernel recently incorporated a protection which randomizes the stack making exploitation of stack based overflows more difficult. I present here an attack which works on exploiting static addresses in Linux. You should be familiar with standard stack smashing before attempting this paper.
Thank you.
__________________________________ Yahoo! Mail - PC Magazine Editors' Choice 2005 http://mail.yahoo.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt Micheal Turner (Oct 11)
- <Possible follow-ups>
- http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt none none (Oct 11)
- Re: [Full-disclosure] http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt Eduardo Tongson (Oct 11)