Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Feb 2000 14:20:47 -0800
From:      "Ronald F. Guilmette" <rfg@monkeys.com>
To:        freebsd-hackers@freebsd.org, gnu-gcc@gnu.org
Subject:   Defending against buffer overflows.
Message-ID:  <12502.950912447@monkeys.com>

next in thread | raw e-mail | index | archive | help

My attention has just been called to:

   http://immunix.org/StackGuard/mechanism.html

Given all of the buffer overrun vulnerabilities that have been found in
various network daemons over time, this seems like a worthwhile sort of
technique to apply when compiling, in particular, network daemons and/or
servers.

I don't entirely agree with this fellow's approach however.  I think that
the ``canary'' word should be located at the bottom end of the current
stack frame, i.e. in a place where no buffer overrun could possibly clobber
it.

Seems to me that this would be a nice and useful little enhancement for gcc.
I wouldn't mind having something like a -fbuffer-overrun-checks option for
gcc, and I would definitely use it when compiling network daemons.

Anybody else got an opinion?



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?12502.950912447>