Date: Thu, 26 Jun 2003 21:04:24 -0400 (EDT) From: Jeff Roberson <jroberson@chesapeake.net> To: "D. J. Bernstein" <djb@cr.yp.to> Cc: freebsd-performance@freebsd.org Subject: Re: sacrificing performance for confusion Message-ID: <20030626210127.O17881-100000@mail.chesapeake.net> In-Reply-To: <20030626220945.75399.qmail@cr.yp.to>
next in thread | previous in thread | raw e-mail | index | archive | help
On 26 Jun 2003, D. J. Bernstein wrote: > > Using VMM protection to forbid code execution within the DATA, BSS, heap, > > and stack (if one can) mitigates against a common class of problems-- > > I don't believe you. Show me a real program that's (1) vulnerable if > data/bss/heap/stack are executable and (2) invulnerable otherwise. > > Yes, attacks are often written to take advantage of executable stacks; > but, in every case I've investigated, the programs would still have been > vulnerable with non-executable stacks. They would be vulnerable to a denial of service but not to any privilige gaining exploit. Please go spread FUD somewhere else. We're not going to put all of your sections in the same page. Nobody cares. Cheers, Jeff
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030626210127.O17881-100000>