Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 29 Aug 1995 20:05:12 -0400 (EDT)
From:      Mark Hittinger <bugs@ns1.win.net>
To:        security@freebsd.org
Subject:   Re: [8lgm]-Advisory-22.UNIX.syslog.2-Aug-1995 (fwd)
Message-ID:  <199508300005.UAA28922@ns1.win.net>

next in thread | raw e-mail | index | archive | help
> > >shades of rtm
> > Anyone for execute-protected data by default if the machine can support
> > it?  Programs that want to execute data should have to request it and
> > everything else would be more secure.
> 	the segment descriptors support the text (code) vs data 
> identification.  this would be a big win regarding security (and writing 
> to wild pointers that hit your own code segment ;)

YES!

> 	we should still examine all the system libraries for similar 
> problems (buffer overrun).  this was the exact same problem that rtm used 
> to compromise fingerd, it used gets(), syslog() used sprintf().
> 

The RPC stuff seems to use this also.  "strcpy" is also a bad boy.

Regards,

Mark Hittinger
bugs@win.net



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199508300005.UAA28922>