[31163] in bugtraq
Re: Buffer overflow prevention
daemon@ATHENA.MIT.EDU (Mariusz Woloszyn)
Thu Aug 14 12:46:00 2003
Date: Thu, 14 Aug 2003 11:44:13 +0200 (EEST)
From: Mariusz Woloszyn <emsi@ipartners.pl>
To: bugtraq <bugtraq@securityfocus.com>
In-Reply-To: <200308131320.03312.dolan@cc.admin.unt.edu>
Message-ID: <Pine.LNX.4.50.0308141138570.2830-100000@dzyngiel.ipartners.pl>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=iso-8859-1
Content-Transfer-Encoding: 8BIT
On Wed, 13 Aug 2003, Patrick Dolan wrote:
> There is a flag for the Gnu C/C++ compilers, -fstack-protector, that will
> implement ProPolice stack protection. It should prevent stack smashing
> techniques.
>
ProPolice (http://www.research.ibm.com/trl/projects/security/ssp/) is a
great tool that not only protects the return address on the stack, but
also changes the order of local variables and protects the function
arguments! It's a way better protector than StackGuard and is a way more
efficient than a "two stack approach", providing _almost_ as good
protection, which sometimes is even better!!![1]
[1]: it protects the local variables (pointer) and function arguments,
which neither StagGuard nor StackShield ("two stack approach") do.
--
Mariusz Wołoszyn
Internet Security Specialist, GTS - Internet Partners