Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 9 Jul 2001 03:07:34 +0200 (CEST)
From:      solwar <solwar@email.si>
To:        alexus <ml@db.nexgen.com>
Cc:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: non-exec stack
Message-ID:  <20010709030412.I3212-100000@SOLos.tw>
In-Reply-To: <001701c107f1$b3881fc0$97625c42@alexus>

next in thread | previous in thread | raw e-mail | index | archive | help
Most buffer overflow exploits are based on overwriting a function's return
address on the stack to point to some arbitrary code, which is also put
onto the stack.  If the stack area is non-executable, buffer overflow
vulnerabilities become harder to exploit.


On Sun, 8 Jul 2001, alexus wrote:

> what do you mean by non-exec?
>
> ----- Original Message -----
> From: "solwar" <solwar@email.si>
> To: <freebsd-security@FreeBSD.ORG>
> Sent: Sunday, July 08, 2001 5:03 PM
> Subject: non-exec stack
>
>
> > Hello,
> > Is there is any non-exec stack kernel patch available for FreeBSD?
> > (like linux's openwall patch from solar designer, www.openwall.com)
> > tnx
> >
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> >
>
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010709030412.I3212-100000>