Date: Mon, 29 Jun 1998 14:48:04 -0700 From: Don Lewis <Don.Lewis@tsc.tdk.com> To: njs3@doc.ic.ac.uk (Niall Smart), Patrick McAndrew <pfm@slack.net>, jtb <jtb@pubnix.org> Cc: Wojciech Sobczuk <sopel@hood.1lo.lublin.pl>, fpscha@schapachnik.com.ar, ncb05@uow.edu.au, security@FreeBSD.ORG Subject: Re: non-executable stack? Message-ID: <199806292148.OAA26760@salsa.gv.tsc.tdk.com> In-Reply-To: njs3@doc.ic.ac.uk (Niall Smart) "Re: non-executable stack?" (Jun 27, 11:07am)
next in thread | raw e-mail | index | archive | help
On Jun 27, 11:07am, Niall Smart wrote: } Subject: Re: non-executable stack? } You misunderstand. My proposal, seemingly seconded by jtb, was to } allow the administrator to disallow the presence of non-printable ascii } characters in the environment or command line arguments at the time of } execve of certain processes. We still don't know if this will have any } effect on security though, since no-one has checked to see if its possible } to write shellcode using just printable ASCII. It would certainly } make life difficult for the attacker, since it would be impossible to } overwrite the saved eip with an address on the stack since the stack } is at the top of the address space around 0xFFxxxxxx or 0xEFxxxxxx. >From my archives of the firewalls mail list: --- Forwarded mail from padgett@tccslr.dnet.mmc.com (A. Padgett Peterson, P.E. Information Security) >From firewalls-relay@tus.ssi1.COM Wed Dec 21 15:30:26 1994 Date: Wed, 21 Dec 94 15:12:55 -0500 Message-Id: <9412212012.AA09780@uvs1.orl.mmc.com> From: padgett@tccslr.dnet.mmc.com (A. Padgett Peterson, P.E. Information Security) To: "firewalls@greatcircle.com"@UVS1.dnet.mmc.com Subject: Example of the futility of determining contents from packets Sender: firewalls-owner@GreatCircle.COM Precedence: bulk Status: OR Once again the question was asked if a packet filter can detect viruses and I responded "No" at least not without a *very* complex determination first of WHAT the program is, and WHICH platform it is intended for. The following short executable program is an example of this (note that it is pgp *signed* and not "converted" to ASCII) executable ASCII using a mechanism to allow the passage of .COM files through E-mail gateways. Unlike UUENCODED files though, the ASCII itself is executable - if I had sent it without the PGP signature, many systems could execute it directly from the mail window. Extracted with PGP switch -o CARD.COM it becomes a DOS executable program 2064 bytes long. You *could* just strip the header off (down to the line that starts "XP[@PPD...") and execute that if you feel brave (the trailing signature lines do not matter). But the point is that I could have used the "ASCIIzer" (YAAA) recursively to additionally wrap the contents (in an experiment I recursively ran it on itself until the original 1k binary had become a 45k "Katchina Doll" that was still executable). Meanwhile, if nothing else, Happy Holidays, Padgett ps this is a later version (but still a "beta") than Rob rote about in CUD - for easy checking, all lines are 64d/40h characters long. pps The tune sounds OK to me but remember, I have been wearing hearing aids for over 20 years & every speaker is different. -----BEGIN PGP SIGNED MESSAGE----- XP[@PPD]5`P(f#(f((f?5!QP^P_u!2$=po}l=!!rZF*$*$ =0%GF%!!%PP$P$Ps- $l%gmZ$rl6lW$rm6mWlVl6m=ldmAlv%fmvmB%Xm6lW%Xm6mWl6m6m=ld%ylVmqlJ mqlRmqlNmqlBlWl6m6l/m'l/m3mql8mrm4mql:mAm1l\m/mPl.%tm5$j$Xm5mBmg m6mWl6l6lZl6m.mZlvl5lB$wl6lZl6m.mZ$bl4lB%|l6lZl6%ZmZl&%vlBl$l6lZ l!m#mWlVm4lB%wl6lZl!m#mW$rl3lB${l6lZl!%{mW$Zm5lB$wl6lBl.l6lBmbl6 mB%dm6l3mYl6lZlomUm=mam3mUlZl6l5%ymIlYl6m+mPl.l\m2lYm)l5mPm&mUl3 mYl6lZlomUmZm6l6lYl*l6lBm-l6m3mUl3mYl6lZlomUmZm6l6lYl(l6lBm+l6m3 mU%jm=ma%f%ulQ%Y$lmvmSlgl6m!m:m!m:mumVl5mAmAlBm$l6mvmSlil6lBl'l6 %jm=ma%fmum?l5lBl,l6mumSl5%ulQ%Yl$mvmSlkl6m!m:m!m:mumVl5mAmG$jmv m?lgl6mflHm6mamflGm6mvmSlgl6ma$fmUmnl,lYl'lZl6$_m!m:mum?m5mZl5l6 mamamvmSlhl6lEl:mUl3%glZl6lZlolVmWlZm6lZm/m/mamvmSlhl6lZmPm/mal7 lVmal7lRmamvmSlhl6lZlYm/ma%cm3mUl&l&l&l&l&l&l&l&l&l&l&l&%g%^%Y$^ %^$[%_l&%V%[%Xl&%b$[$`l&%V%[%X$Y%Yl&$X$^%`l&%_$Y%`%`$X%^$[%_%Yl& %[$_l&$m%[%Vl&%b$[$`l&$i%`%\%`%\$a%`$Y%b$[%a%`m0l1l&l&l&l&l&l&l& l&l&l&l&l&%^$[l&$X$^%^%Yl&$n%[$\%^$`%b%Vl&%i%`%b%Y%[$[${l1%g%b$Y %\$\%V$|l1$j%b$`%_%`$X$X$|l&$l%^$[$`%b$|l&l#l&%o%`%[$_$_%`$Y%Vl$ l3lZl2%xmPm&mrl'$pm5lpl3$om5l'm3lY$wm5lZl2m$mPm&lW%nm5m`m1lV$X$w $j%ylVl^l[lC%q$flC$qlqlTlC$qlD%bl0m5lC%bl`le$nm5lB$nl6lD%bl$l8lC %bl\m1mPm&l7lV$Xm2l`le$nm5lB%yl6mAmRl\l2mPm&l'mql+$pm5lol'$om5lZ l2m$mPm&m'mWl6l6lZl6m+mZl6$rmWl6l6lB%{l7lZl6l5%ymIlYl6l6mPl.lZl6 $lmPm&lv$s$nm5l6%Wm:mU$j%ylV${lf$nm5$n${le$nm5$flAl6l6l6l6l6l7l5 l2m6mGm1m3m6mGm1m5m6lll1m5m6mGm1m5m6lVl0m5m6m$l/m3m6m$l/m3m6m$l/ m3m6lll1m3m6lll1m5m6$Zm2m5m6lll1m5m6mGm1m5m6lVl0m3m6l7l5m3m6l7l5 m3m6$Zm2m3m6$Zm2m5m6lCm3m5m6$Zm2m5m6lll1m5m6mGm1m3m6m$m/m3m6l7l5 m5m6l7l5m5m6m$m/m3m6lll1m3m6lVl0m3m6mGm1l1l.l7l5m3m6mGm1m3m6mGm1 m3m6mGm1m3m6lVl0l1m6lVl0m3m6mGm1m3m6lVl0m3m6m$m/m3m6l7l5l1m6l7l5 m3m6$Zm2m3m6lll1m3m6mGm1m3m6l>m3m3m6l7l5m3m6l7l5m5m6l7l5m5m6m$m/ m3m6lll1m3m6lVl0m3m6mGm1l1l.l7l5m3m6mGm1m3m6mGm1m5m6lll1m5m6mGm1 m5m6lVl0m5m6m$l/m3m6m$l/m3m6m$l/m3m6lll1m3m6lll1m5m6$Zm2m5m6lll1 m5m6mGm1m5m6lVl0m3m6l7l5m3m6l7l5m3m6$Zm2m3m6$Zm2m5m6lCm3m5m6$Zm2 m5m6lll1m5m6mGm1m3m6m$m/m3m6l7l5m5m6l7l5m5m6m$m/m3m6lll1m3m6lVl0 m3m6mGm1l1l.l6l6pp_YAAA_v1.02_copyright_(C)_1994_by_Padgett_____ -----BEGIN PGP SIGNATURE----- Version: 2.7 iQCVAgUBLvgNcYVuK+48ORdVAQEjDQP+Ndm2FryRXkUzW47E+88jCCZi/VPSqJ57 l08JPkBc3P6BX9nh8bJjcJXrmmwa0mgFaH6Ov96jQ1kk+Q+NEEL45TiAy5k4oHH2 F5SaGhh7AQ2OOtSgXfXpLkh1FRIVzO+INL/af3+GFdG62rswztUEhGieslu+1bF/ dFqWpAGxuHE= =Xf/8 -----END PGP SIGNATURE----- --- End of forwarded message from padgett@tccslr.dnet.mmc.com (A. Padgett Peterson, P.E. Information Security) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199806292148.OAA26760>