Re: Unexecutable Stack / Buffer Overflow Exploits...

Damien Miller (djm@mindrot.org)
Thu, 30 Dec 1999 15:10:41 +1100 (EST)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wed, 29 Dec 1999, Gregory Maxwell wrote:

> The effectiveness of this patch comes from two places:
>
> A) It's rare and breaks all existing attacks.
> B) I actually makes that class of attack harder to accomplish.

C) It warns you when a buffer overrun attempt has been made,
which alerts you to the problem and gives you a chance to fix
or disable the offending program.

Regards,
Damien Miller

- --
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm@mindrot.org (home) -or- djm@ibs.com.au (work)

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.0 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE4attEormJ9RG1dI8RAk3MAJ9ju7E/cESvviqi7rafmZADb49tAgCgidzK
fdkeY1cuVJHCLxAAEmWlTmY=
=Fewn
-----END PGP SIGNATURE-----

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/