Subject: [OT] Re: Stackghost in OpenBSD: buffer overflow protection
To: Darren Reed <port-sparc@netbsd.org, avalon@cairo.anu.edu.au>
From: Hubert Feyrer <hubert@feyrer.de>
List: port-sparc
Date: 09/22/2001 21:37:04
In article <200109210615.f8L6Fhn5020949@cairo.anu.edu.au> you wrote:
> At Usenix security symposium, one of the OpenBSD hacks (without a sense of
> humour, I might add) presented a paper on buffer overflow protection by
> hijacking register window changes. The home page for the work done on this
> can be found at:
>
> http://stackghost.cerias.purdue.edu
Solaris has some switches to make the stack segment non-executable.
I wonder if that's possible on some/all of NetBSD archs?
- Hubert
--
Want to get a clue on IPv6 but don't know where to start? Try this:
* Basics -> http://www.onlamp.com/pub/a/onlamp/2001/05/24/ipv6_tutorial.html
* Setup -> http://www.onlamp.com/pub/a/onlamp/2001/06/01/ipv6_tutorial.html
Of course with your #1 IPv6 ready operating system -> http://www.NetBSD.org/