[31184] in bugtraq
Re: Buffer overflow prevention
daemon@ATHENA.MIT.EDU (Matt D. Harris)
Thu Aug 14 16:46:53 2003
Message-ID: <3F3BEC6C.6010007@depraved.org>
Date: Thu, 14 Aug 2003 16:09:16 -0400
From: "Matt D. Harris" <vesper@depraved.org>
MIME-Version: 1.0
In-Reply-To: <200308141937.h7EJb6hd021598@cvs.openbsd.org>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
To: undisclosed-recipients:;undisclosed-recipients:;@MIT.EDU
Theo de Raadt wrote:
> I believe the best protection (at this time) is to combine ProPolice with
> a W^X technology.
Solaris 2.6 and above also support a kernel variable which can be set
via /etc/system called "noexec_user_stack", which can make the stack for
userland processes non-executable by default. Note that this behavior
is the default for 64-bit binaries in Solaris 7, 8, and 9, and this
kernel variable forces the behavior for 32-bit binaries. I run all
sorts of odd software and have never had an issue with having this
always turned on for all of my systems.