Re: Stack Shield: defending from

1999-09-09 Thread Crispin Cowan
[EMAIL PROTECTED] wrote: Perhaps I don't see your point. How is this more secure than StackGuard? StackGuard protection system has an extremaly grave bug with the terminator and null canaries. In certain circumstances (not rare) this bug can be exploited preventing StackGuard to detect

Re: Stack Shield: defending from stack smashing attacks

1999-09-04 Thread Chris Keane
On Tue, 31 Aug 1999, "CC" = Crispin Cowan wrote: + So, why would one use the approach of saving the return address on + another stack, instead of patching the stack itself, like StackGuard? + The only reason I can imagine, is that one does not want to change the + stack layout. The

Re: Stack Shield: defending from

1999-09-04 Thread vendicator
This would seem to protect against precisely the same class of attacks as StackGuard: those that use buffer overflows to corrupt the return address in an activation record. The response to attack is subtly differet: * StackGuard: assumes the program is hopelessly corrupted, syslog's

Re: Stack Shield: defending from stack smashing attacks

1999-08-30 Thread Crispin Cowan
[EMAIL PROTECTED] wrote: Stack Shield is a new tool that add protection form "stack smashing" attacks at compile time without changing a line of code. The home page is http://www.angelfire.com/sk/stackshield It is still in beta. The home page say "Stack Shield uses a more secure protection