Subject: [OT] Re: Stackghost in OpenBSD: buffer overflow protection
To: Darren Reed <,>
From: Hubert Feyrer <>
List: port-sparc
Date: 09/22/2001 21:37:04
In article <> you wrote:
> At Usenix security symposium, one of the OpenBSD hacks (without a sense of
> humour, I might add) presented a paper on buffer overflow protection by
> hijacking register window changes.  The home page for the work done on this
> can be found at:

Solaris has some switches to make the stack segment non-executable.
I wonder if that's possible on some/all of NetBSD archs?

 - Hubert

Want to get a clue on IPv6 but don't know where to start? Try this:
* Basics ->
* Setup  -> 
Of course with your #1 IPv6 ready operating system ->