BugTraq
Is DEP easily evadable? Jan 12 2005 07:32PM
John Richard Moser (nigelenki comcast net) (1 replies)
Re: Is DEP easily evadable? Jan 13 2005 10:11AM
Florian Weimer (fw deneb enyo de) (1 replies)
* John Richard Moser:

> I'm no security expert, so bear with me here; I just kind of tripped
> over something interesting that I'd like to ask about.
>
> I was blogging about DEP based on MS' technical documentation and came
> up with a quick and dirty way to use a buffer overflow (we'll assume no
> stackguarding, or that you found a way around it i.e. using a format
> string bug) to kick DEP out of the way. This is pretty much based on
> the PaX documentation and justification for mprotect() restrictions.

Look for return-into-libc exploits. There are quite a few.

Even with non-executable stack and heap, no one guarantees that buffer
overflows aren't exploitable. Randomization of load addresses is
intended to provide additional protection, but the number of available
bits is fairly low on 32 bit machines (problably less than 16). I
don't know if Windows is doing it.

[ reply ]
Re: Is DEP easily evadable? Jan 13 2005 06:40PM
John Richard Moser (nigelenki comcast net) (1 replies)
Re: Is DEP easily evadable? Jan 13 2005 07:38PM
Ben Pfaff (blp cs stanford edu) (1 replies)
Re: Is DEP easily evadable? Jan 14 2005 06:04AM
John Richard Moser (nigelenki comcast net) (1 replies)
Re: Is DEP easily evadable? Jan 14 2005 06:21AM
Ben Pfaff (blp cs stanford edu)


 

Privacy Statement
Copyright 2010, SecurityFocus