DragonFly BSD
DragonFly commits List (threaded) for 2003-12
[Date Prev][Date Next]  [Thread Prev][Thread Next]  [Date Index][Thread Index]

Re: cvs commit: src/contrib/gcc protector.c protector.h Makefile.in calls.c combine.c cse.c explow.c expr.c flags.h function.c gcse.c integrate.c libgcc2.c loop.c optabs.c reload1.c toplev.c src/gnu/usr.bin/cc/cc_int Makefile

From: Jeroen Ruigrok/asmodai <asmodai@xxxxxx>
Date: Thu, 11 Dec 2003 11:53:06 +0100

-On [20031211 09:52], Matthew Dillon (dillon@xxxxxxxxxxxxxxxxxxxx) wrote:
>    huh?  I don't think I understood a single word of this posting (!) :-)

As far as I understand it:

With Propolice you only disable smashing the stack.  What Propolice and
StackGuard and similar protections do is add a 'canary' (informer/decoy)
value just before the return addresses on the run-time stack.  Propolice
and StackGuard add additional code in your binary which then checks if
the canary value is present or not.  If it is not a buffer overflow has

Thing is that SEBP or SEIP still is available before or after the canary
value.  You can place shellcode on the heap and just jump there.

Hence OpenBSD also implemented W^X (Write XOR eXecutable).  This also
makes sure that memory get fine-grained permissions.  Which thus limits
executing in the stack and heap.

This is at least my understanding, I could of course be way off with my

Jeroen Ruigrok van der Werven <asmodai(at)wxs.nl> / asmodai / kita no mono
PGP fingerprint: 2D92 980E 45FE 2C28 9DB7  9D88 97E6 839B 2EAC 625B
http://www.tendra.org/   | http://diary.in-nomine.org/
Yet each man kills the thing he loves...

[Date Prev][Date Next]  [Thread Prev][Thread Next]  [Date Index][Thread Index]