Date: Tue, 29 Aug 1995 20:05:12 -0400 (EDT) From: Mark Hittinger <bugs@ns1.win.net> To: security@freebsd.org Subject: Re: [8lgm]-Advisory-22.UNIX.syslog.2-Aug-1995 (fwd) Message-ID: <199508300005.UAA28922@ns1.win.net>
next in thread | raw e-mail | index | archive | help
> > >shades of rtm > > Anyone for execute-protected data by default if the machine can support > > it? Programs that want to execute data should have to request it and > > everything else would be more secure. > the segment descriptors support the text (code) vs data > identification. this would be a big win regarding security (and writing > to wild pointers that hit your own code segment ;) YES! > we should still examine all the system libraries for similar > problems (buffer overrun). this was the exact same problem that rtm used > to compromise fingerd, it used gets(), syslog() used sprintf(). > The RPC stuff seems to use this also. "strcpy" is also a bad boy. Regards, Mark Hittinger bugs@win.net
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199508300005.UAA28922>