Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 29 Oct 2001 09:22:33 +0100
From:      Luc <luc@2113.ch>
To:        freebsd-security@freebsd.org
Cc:        Krzysztof Zaraska <kzaraska@student.uci.agh.edu.pl>
Subject:   Re: BUFFER OVERFLOW EXPLOITS
Message-ID:  <3BDD11C8.4746A7BD@2113.ch>
References:  <Pine.BSF.4.21.0110281500030.6086-100000@lhotse.zaraska.dhs.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hello,

> Is this programming, compiler or compiling options error?
> How to avoid this problem on practice (writing programs)?

Can one confirm we may prevent FreeBSD buffer overflow 
using this document:

"GCC extension for protecting applications from stack-smashing attacks"
http://www.trl.ibm.com/projects/security/ssp/

Why isn't FreeBSD built with such extension (by default) ?

Thanks all
Luc

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3BDD11C8.4746A7BD>