[14872] in bugtraq

home help back first fref pref prev next nref lref last post

Re: non-exec stack

daemon@ATHENA.MIT.EDU (Nate Eldredge)
Thu May 11 23:04:52 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <14617.64723.929839.560557@mercury.st.hmc.edu>
Date:         Wed, 10 May 2000 17:20:35 -0700
Reply-To: Nate Eldredge <neldredge@HMC.EDU>
From: Nate Eldredge <neldredge@HMC.EDU>
X-To:         Gert Doering <gert@GREENIE.MUC.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000509211251.C23536@greenie.muc.de>

Gert Doering writes:
 > Hi,
 >
 > On Mon, May 08, 2000 at 10:06:04AM +0200, Casper Dik wrote:
 > > >Here's an overflow exploit that works on a non-exec stack on x86 boxes.
 > > >It demonstrates how it is possible to thread together several libc
 > > >calls.  I have not seen any other exploits for x86 that have done this..
 > >
 > > Non-executable stacks do not work in Solaris/x86.
 > >
 > > It is impossible to give page level protection that prevents
 > > execution on the x86 architecture.
 >
 > Hmmm, so how do they do that on Linux?  I thought Solar Designer had a
 > non-exec-stack patch for Linux.

Presumably you could map the code segment so as to exclude the stack.
Then, since a user-mode program cannot change the segmentation without
kernel assistance, the stack would then not be executable.

--

Nate Eldredge
neldredge@hmc.edu

home help back first fref pref prev next nref lref last post