[4383] in bugtraq
Re: SMASHING THE STACK: PREVENTION?
daemon@ATHENA.MIT.EDU (Thomas H. Ptacek)
Tue Apr 29 23:50:31 1997
Date: Tue, 29 Apr 1997 06:58:53 -0500
Reply-To: tqbf@enteract.com
From: "Thomas H. Ptacek" <tqbf@ENTERACT.COM>
X-To: massimo@VNET.IBM.COM
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <199704281356.JAA30878@netspace.org> from "massimo at
vnet.ibm.com" at Apr 28, 97 01:45:32 pm
> What about a sort of "execXXX-wrapper"? Instead of patching the kernel,
> I wonder whether it make sense to patch the C library (libc.a). In each
> routine of the exec family (execvp, execl, execve...) one could add something
> like:
This doesn't do anything to prevent stack overruns. A conventional stack
overrun exploit doesn't use the C library system call interface; it
duplicates it entirely in assembler.
----------------
Thomas Ptacek at EnterAct, L.L.C., Chicago, IL [tqbf@enteract.com]
----------------
"If you're so special, why aren't you dead?"