Re: Sabotaged PaXtest (was: Re: Patch 4/6 randomize the stack pointer)

From: Olivier Galibert
Date: Wed Feb 02 2005 - 13:06:43 EST


On Wed, Feb 02, 2005 at 10:18:27PM +1000, pageexec@xxxxxxxxxxx wrote:
> your concerns would be valid if this was impossible to achieve by an
> exploit, sadly, you'd be wrong too, it's possible to force an exploited
> application to call something like dl_make_stack_executable() and then
> execute the shellcode.

If you can call mprotect() with a protected environment to unprotect
it, you can as easily call exec.

OG.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/