[12756] in bugtraq

home help back first fref pref prev next nref lref last post

Re: WordPad/riched20.dll buffer overflow

daemon@ATHENA.MIT.EDU (Jason Spence)
Mon Nov 29 14:45:12 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <003601bf39a2$07711580$1906aace@nexus>
Date:         Sun, 28 Nov 1999 05:11:01 -0800
Reply-To: Jason Spence <thalakan@TECHNOLOGIST.COM>
From: Jason Spence <thalakan@TECHNOLOGIST.COM>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

----- Original Message -----
From: Glynn Clements <glynn@SENSEI.CO.UK>
To: <BUGTRAQ@SECURITYFOCUS.COM>
Sent: Saturday, November 27, 1999 7:22 AM
Subject: Re: WordPad/riched20.dll buffer overflow


> Christopher Rhodes wrote:
>
> > I think one of the major problems with the Linux implementation, and
> > apparently windows too, is that noone pays attention to the added
security
> > provided by segmentation (at least to the point of putting the stack on
a
> > different segment?)
>
> Having separate non-overlapping stack and data segments causes a great
> many problems if you want to be able to write programs in C, given
> that a data pointer has to be able to record the address of any
> variable, regardless of whether it is static (data segment) or
> automatic (stack segment).

Looking through the source code some more, I see examples of this.  It would
completely hose the portability of the source code too.  It might be a good
exercise to get a copy of the Coriolis book, "Linux Core Kernel Commentary",
which has a bunch of these issues addressed, as well as a discussion of the
memory model problem in the back.

 - Jason

home help back first fref pref prev next nref lref last post