lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050729202133.P86052@fledge.watson.org>
Date: Sat Jul 30 01:22:52 2005
From: arr at watson.org (Andrew R. Reiter)
Subject: Cisco IOS Shellcode Presentation

On Fri, 29 Jul 2005, Frank Knobbe wrote:

:On Fri, 2005-07-29 at 18:57 -0500, J.A. Terranson wrote:
:> They fucked up.  They'll have to fix it then.  But thats not the same
:as
:> the gross negligence they're being accused of.
:
:I'm not sure that can fix that. Unless they add canaries to the stack
:and include other OpenBSD style W^X type checks. I mean, it's the same
:problem any OS that uses stacks faces. It's just that we now begin to
:see how things are laid out in IOS and gain information about its
:routines, how it works, and how to bypass watchdogs and such.

If you watched the presentation or have looked at anything Cisco IOS 
related, you'd know that stack usage is quite limited and, if I recall, 
they do have a canary-esque implementation.

:
:Cisco just has to be more careful with vulnerabilities now since they
:can be exploited better :)
:
:Cheers,
:Frank
:
:
:-- 
:Shame on Cisco. Double-Shame on ISS.
:
:

--
Andrew R. Reiter
arr@...son.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ