Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Feb 1997 14:18:27 -0700
From:      Warner Losh <imp@village.org>
To:        tqbf@enteract.com
Cc:        dufault@hda.com, freebsd-security@freebsd.org
Subject:   Re: buffer overruns 
Message-ID:  <E0vu37M-0005S4-00@rover.village.org>
In-Reply-To: Your message of "10 Feb 1997 11:59:41 GMT." <19970210115941.27807.qmail@char-star.rdist.org> 
References:  <19970210115941.27807.qmail@char-star.rdist.org>  

next in thread | previous in thread | raw e-mail | index | archive | help

In message <19970210115941.27807.qmail@char-star.rdist.org> tqbf@enteract.com writes:
: In article <199702100954.EAA08773@hda.hda.com>, you wrote:
: >Is the stack executable?  I've been assuming the exploits modify
: 
: Yes.

The problem width making the stack non-executable is that it breaks
gcc generated code.  It will place trampoline code on the stack for a
variety of things, and then jump to that code.  Exceptions and nested
scopes come to mind for when this happens, but it has been a while
since I checked this out.

Also, SunOS implements a lazy link for shared libraries.  When the
program starts to execute, it has a bunch of jumps to a routine that
fixes up the jumps to the right place and then jumps there itself.

Warner



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0vu37M-0005S4-00>