[11939] in bugtraq

home help back first fref pref prev next nref lref last post

Re: fixing all buffer overflows --- random magin numbers

daemon@ATHENA.MIT.EDU (Oliver Xymoron)
Fri Sep 17 15:45:50 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.9909171057340.971-100000@waste.org>
Date:         Fri, 17 Sep 1999 11:06:38 -0500
Reply-To: Oliver Xymoron <oxymoron@WASTE.ORG>
From: Oliver Xymoron <oxymoron@WASTE.ORG>
X-To:         Crispin Cowan <crispin@CSE.OGI.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <37DD927B.9003E6C6@cse.ogi.edu>

On Tue, 14 Sep 1999, Crispin Cowan wrote:

> (post sent as HTML and ASCII because there's a table that's easier to read
> in HTML.  Aleph, go ahead and nuke the HTML if you prefer)

Urg. Pine happily munged it on reply:

> The result looks like this:
>
>             Interface                            Implementation
>
>  Restriction   * Firewalls                          * Bounds checking
>                * TCP Wrappers                       * StackGuard
>                * Randomly renaming system files
>                * Randomly renumbering system
>  Permutation     calls (the hack proposed here      * Randomly munging
>                  by Maniscalco)                       data layout
>                * Fred Cohen's Deception Toolkit

You missed a couple interesting ones. One is randomly offsetting the
stack. Another is having separate stacks for the call chain and local
variables. Obviously wastes a register (or an indirection), but can
probably be proved secure against stack smashing.

--
 "Love the dolphins," she advised him. "Write by W.A.S.T.E.."

home help back first fref pref prev next nref lref last post