lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1122682069.32564.78.camel@localhost> Date: Sat Jul 30 01:07:59 2005 From: frank at knobbe.us (Frank Knobbe) Subject: Cisco IOS Shellcode Presentation On Fri, 2005-07-29 at 18:57 -0500, J.A. Terranson wrote: > They fucked up. They'll have to fix it then. But thats not the same as > the gross negligence they're being accused of. I'm not sure that can fix that. Unless they add canaries to the stack and include other OpenBSD style W^X type checks. I mean, it's the same problem any OS that uses stacks faces. It's just that we now begin to see how things are laid out in IOS and gain information about its routines, how it works, and how to bypass watchdogs and such. Cisco just has to be more careful with vulnerabilities now since they can be exploited better :) Cheers, Frank -- Shame on Cisco. Double-Shame on ISS. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 187 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050729/24b1f7be/attachment.bin
Powered by blists - more mailing lists