[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: security on Dial-up Systems
Anyway, how can someone exec on the stack ?! I think that the 1st thing
that happens if you do that while not being root is a SIGSEGV. This
because the stack is not necessarily in user space all the time and if it
is then it can't do things to the kernel imho. The 'interesting' stack
(from the hacking point of view) is in the kernel, i.e. when calling a
kernel func from user space to gain some privileges. Am I right ? I am
learning programming and I want to 'build' this kind of logic into my
programming habits.
Thanks for the nonexec stack URL.
On Fri, 1 Aug 1997, Ira Abramov wrote:
> On Fri, 1 Aug 1997, Peter Lorand Peres wrote:
>
> > Nimrod, where can the non-exec stack patch be gotten (or name 4 searching)
> > please.
> >
>
> AFAIK, this is the latest version...
>
> http://www.linuxhq.com
> |
> v
> http://www.linuxhq.com/upatch20.html
> |
> v
> http://www.linuxhq.com/patch/20-p0491.html
>
>
>
> " I've released a new version of my Linux kernel patch (x86 only) that
> makes the stack non-executable. Now it got some configurable options,
> exploit attempt logging, a new flag for ELF/a.out headers, and even some
> comments in the source. The whole thing (diffs against 2.0.30 and 2.1.36,
> auxiliary tools, and some documentation) are now available. "
>
> download: http://www.false.com/security/linux-stack/linux-stack.tar.gz
>
>
Peter Lorand Peres
------------------
plp@actcom.co.il 100310.2360 on CIS (please use Internet address for mail)
http://ourworld.compuserve.com/homepages/plp
Follow-Ups:
References: