Subject: Re: exploit with memcpy()
To: None <tech-userlevel@netbsd.org>
From: Greg A. Woods <woods@weird.com>
List: tech-userlevel
Date: 07/02/2002 15:37:03
[ On Tuesday, July 2, 2002 at 19:29:48 (+0100), David Laight wrote: ]
> Subject: Re: exploit with memcpy()
>
> OTOH maybe stopping the stack being executable would be a better
> ploy for catching the effects of undersize onstack data buffers.
> (at least then you can only jump to code that exists in the
> program being executed.)

Or in any the shared libraries they link to....

-- 
								Greg A. Woods

+1 416 218-0098;            <g.a.woods@ieee.org>;           <woods@robohack.ca>
Planix, Inc. <woods@planix.com>; VE3TCP; Secrets of the Weird <woods@weird.com>