Date: Tue, 04 Feb 2003 12:23:54 -0800 From: Tim Kientzle <kientzle@acm.org> To: Justin Lundy <jbl@cvs.tegatai.com> Cc: freebsd-hackers@FreeBSD.ORG Subject: Re: [eugene@securityarchitects.com: Re: Preventing exploitation with rebasing] Message-ID: <3E40215A.4050207@acm.org> References: <20030204195114.GA92636@cvs.tegatai.com>
index | next in thread | previous in thread | raw e-mail
Justin Lundy wrote: > "Add a possibility to add a random offset to the stack on exec. This makes > it slightly harder to write generic buffer overflows. This doesn't really > give any real security, but it raises the bar for script-kiddies and it's > really cheap. This idea can also be used within applications. Just use alloca(<random value>) to randomize the stack location. No kernel changes needed. There are more portable ways to do this, of course, for those who dislike alloca. Tim Kientzle To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the messagehelp
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3E40215A.4050207>
