Subject: Re: exploit with memcpy()
To: None <firstname.lastname@example.org>
From: Greg A. Woods <email@example.com>
Date: 07/02/2002 15:37:03
[ On Tuesday, July 2, 2002 at 19:29:48 (+0100), David Laight wrote: ]
> Subject: Re: exploit with memcpy()
> OTOH maybe stopping the stack being executable would be a better
> ploy for catching the effects of undersize onstack data buffers.
> (at least then you can only jump to code that exists in the
> program being executed.)
Or in any the shared libraries they link to....
Greg A. Woods
+1 416 218-0098; <firstname.lastname@example.org>; <email@example.com>
Planix, Inc. <firstname.lastname@example.org>; VE3TCP; Secrets of the Weird <email@example.com>