Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 04 Feb 2003 12:23:54 -0800
From:      Tim Kientzle <kientzle@acm.org>
To:        Justin Lundy <jbl@cvs.tegatai.com>
Cc:        freebsd-hackers@FreeBSD.ORG
Subject:   Re: [eugene@securityarchitects.com: Re: Preventing exploitation with rebasing]
Message-ID:  <3E40215A.4050207@acm.org>
References:  <20030204195114.GA92636@cvs.tegatai.com>

index | next in thread | previous in thread | raw e-mail

Justin Lundy wrote:

> "Add a possibility to add a random offset to the stack on exec. This makes
> it slightly harder to write generic buffer overflows. This doesn't really
> give any real security, but it raises the bar for script-kiddies and it's
> really cheap.


This idea can also be used within applications.
Just use

   alloca(<random value>)

to randomize the stack location.  No kernel
changes needed.  There are more portable ways
to do this, of course, for those who dislike alloca.

Tim Kientzle


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message



help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3E40215A.4050207>