Vulnerability Development mailing list archives

Re: No-Exec Stack Smashing 101


From: lamont () ICOPYRIGHT COM (Granquist, Lamont)
Date: Tue, 25 Apr 2000 13:58:00 -0700


Okay, lets say that you've got:

1.  non-exec stack
2.  libc remapped to location with 0x00 in it
3.  statically linked executable, so no PLT functions

And assume the bug is a simple buffer overflow in a string function which
terminates on a 0x00 (i.e. ignore for the moment ways around a 0x00
"canary")

How can you get around that?  Is there a more general way around non-exec
stacks than return-into-PLT exploits?


Current thread: