Penetration Testing mailing list archives
Re: [PEN-TEST] Crusoe chip.
From: Robert van der Meulen <rvdm () CISTRON NL>
Date: Tue, 7 Nov 2000 10:01:40 +0100
Hi, Quoting Ben Ford (bford () TALONTECH COM):
My question is this: Because the x86 architecture is only software emulated on the Crusoe chip, could that chip (or the software layer emulating the x86) detect when a buffer overflow was happening and head off any code execution, thereby eliminating the root exploit?
Why would you want to detect it, when you can disable the execution flag on the segments where you don't want it (bss/stack, etc) ? Afaik if you're mucking around in the software-x86 emulation anyways, it's better to fix stuff than to only detect it :) Ofcourse i don't know the implications of such a solution, does anything rely on those segments being executable ? I also wouldn't know if 'patching' the emulation-code like this is 'intensive' - i'm not an x86 expert :) Greets, Robert -- | rvdm () cistron nl - Cistron Internet Services - www.cistron.nl | | php3/c/perl/html/c++/sed/awk/linux/sql/cgi/security | | My statements are mine, and not necessarily cistron's. | Catch your husband or wife cheating online! (49.95 US Value!) -- spam
Current thread:
- [PEN-TEST] Crusoe chip. Ben Ford (Nov 07)
- Re: [PEN-TEST] Crusoe chip. Craig Anderson (Nov 07)
- Re: [PEN-TEST] Crusoe chip. Bennett Todd (Nov 08)
- Re: [PEN-TEST] Crusoe chip. Robert van der Meulen (Nov 08)
- Re: [PEN-TEST] Crusoe chip. Craig Anderson (Nov 08)
- Re: [PEN-TEST] Crusoe chip. Robert van der Meulen (Nov 09)
- Re: [PEN-TEST] Crusoe chip. Craig Anderson (Nov 08)
- Re: [PEN-TEST] Crusoe chip. c0ncept (Nov 22)
- Re: [PEN-TEST] Crusoe chip. Craig Anderson (Nov 07)