Date: Mon, 9 Jul 2001 03:07:34 +0200 (CEST) From: solwar <solwar@email.si> To: alexus <ml@db.nexgen.com> Cc: <freebsd-security@FreeBSD.ORG> Subject: Re: non-exec stack Message-ID: <20010709030412.I3212-100000@SOLos.tw> In-Reply-To: <001701c107f1$b3881fc0$97625c42@alexus>
next in thread | previous in thread | raw e-mail | index | archive | help
Most buffer overflow exploits are based on overwriting a function's return address on the stack to point to some arbitrary code, which is also put onto the stack. If the stack area is non-executable, buffer overflow vulnerabilities become harder to exploit. On Sun, 8 Jul 2001, alexus wrote: > what do you mean by non-exec? > > ----- Original Message ----- > From: "solwar" <solwar@email.si> > To: <freebsd-security@FreeBSD.ORG> > Sent: Sunday, July 08, 2001 5:03 PM > Subject: non-exec stack > > > > Hello, > > Is there is any non-exec stack kernel patch available for FreeBSD? > > (like linux's openwall patch from solar designer, www.openwall.com) > > tnx > > > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > with "unsubscribe freebsd-security" in the body of the message > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010709030412.I3212-100000>