[14859] in bugtraq

home help back first fref pref prev next nref lref last post

Re: non-exec stack

daemon@ATHENA.MIT.EDU (Gert Doering)
Wed May 10 20:10:04 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000509211251.C23536@greenie.muc.de>
Date:         Tue, 9 May 2000 21:12:51 +0200
Reply-To: Gert Doering <gert@GREENIE.MUC.DE>
From: Gert Doering <gert@GREENIE.MUC.DE>
X-To:         Casper Dik <Casper.Dik@HOLLAND.SUN.COM>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200005080806.KAA28141@romulus.Holland.Sun.COM>; from Casper Dik
              on Mon, May 08, 2000 at 10:06:04AM +0200

Hi,

On Mon, May 08, 2000 at 10:06:04AM +0200, Casper Dik wrote:
> >Here's an overflow exploit that works on a non-exec stack on x86 boxes.
> >It demonstrates how it is possible to thread together several libc
> >calls.  I have not seen any other exploits for x86 that have done this..
>
> Non-executable stacks do not work in Solaris/x86.
>
> It is impossible to give page level protection that prevents
> execution on the x86 architecture.

Hmmm, so how do they do that on Linux?  I thought Solar Designer had a
non-exec-stack patch for Linux.

gert
--
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             gert@greenie.muc.de
fax: +49-89-35655025                        gert.doering@physik.tu-muenchen.de

home help back first fref pref prev next nref lref last post