[3927] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Smashing the stack on a DEC Alpha

daemon@ATHENA.MIT.EDU (Julian Assange)
Fri Jan 17 11:32:48 1997

Date: 	Fri, 17 Jan 1997 18:51:35 +1100
Reply-To: proff@suburbia.net
From: Julian Assange <proff@suburbia.net>
X-To:         dreamer@garrison.inetcan.net
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  <Pine.LNX.3.91.970116173704.28564B-100000@garrison.inetcan.net>
              from Digital Dreamer at "Jan 16, 97 05:37:55 pm"

> If I recall, and I could be wrong here, the stack is marked as
> non-executable on that platform, and as a result, the system won't
> execute code placed there.
>
> Don't quote me on that though.
>
> dreamer

This is the case. The heap however is a different story.  DEC's
design policy left exec bits on for the heap and various library
statics as a legacy for interactive dynamically compiled languages.
As such it the architecture still suffers from buffer overruns,
but requires a two pronged attack; PC adjustment via the stack to
code on the heap. The are other not insurmountable difficulties
with exploiting OSF code - this generally relates to the delayed
binding of the dynamic library system.

Cheers,
Julian <proff@iq.org>

home help back first fref pref prev next nref lref last post