[31564] in bugtraq

home help back first fref pref prev next nref lref last post

Windows 2003 Server - Defeating the stack protection mechanism

daemon@ATHENA.MIT.EDU (NGSSoftware Insight Security Resea)
Thu Sep 11 13:01:03 2003

Message-ID: <08b001c37872$a0645280$8d01010a@GLADIUS>
From: "NGSSoftware Insight Security Research" <nisr@nextgenss.com>
To: <bugtraq@securityfocus.com>, <NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM>,
        <vulnwatch@vulnwatch.org>, <full-disclosure@lists.netsys.com>,
        <vuln-dev@securityfocus.com>
Date: Thu, 11 Sep 2003 15:40:20 +0100
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

For those interested, NGSS has just published a paper describing how to
defeat the mechanism built into Windows 2003 Server to prevent exploitation
of stack based buffer overflow vulnerabilities. Previous work done in this
area presented methods that only worked in highly specific scenarios - the
new methods presented in this paper are generic. The paper can be downloaded
from http://www.nextgenss.com/papers/defeating-w2k3-stack-protection.pdf .
Cheers,
David Litchfield
NGSSoftware Ltd
http://www.nextgenss.com/
+44(0)208 401 0070




home help back first fref pref prev next nref lref last post