Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jun 2003 21:04:24 -0400 (EDT)
From:      Jeff Roberson <jroberson@chesapeake.net>
To:        "D. J. Bernstein" <djb@cr.yp.to>
Cc:        freebsd-performance@freebsd.org
Subject:   Re: sacrificing performance for confusion
Message-ID:  <20030626210127.O17881-100000@mail.chesapeake.net>
In-Reply-To: <20030626220945.75399.qmail@cr.yp.to>

next in thread | previous in thread | raw e-mail | index | archive | help
On 26 Jun 2003, D. J. Bernstein wrote:

> > Using VMM protection to forbid code execution within the DATA, BSS, heap,
> > and stack (if one can) mitigates against a common class of problems--
>
> I don't believe you. Show me a real program that's (1) vulnerable if
> data/bss/heap/stack are executable and (2) invulnerable otherwise.
>
> Yes, attacks are often written to take advantage of executable stacks;
> but, in every case I've investigated, the programs would still have been
> vulnerable with non-executable stacks.

They would be vulnerable to a denial of service but not to any privilige
gaining exploit.

Please go spread FUD somewhere else.  We're not going to put all of your
sections in the same page.  Nobody cares.

Cheers,
Jeff



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030626210127.O17881-100000>