[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050729202133.P86052@fledge.watson.org>
Date: Sat Jul 30 01:22:52 2005
From: arr at watson.org (Andrew R. Reiter)
Subject: Cisco IOS Shellcode Presentation
On Fri, 29 Jul 2005, Frank Knobbe wrote:
:On Fri, 2005-07-29 at 18:57 -0500, J.A. Terranson wrote:
:> They fucked up. They'll have to fix it then. But thats not the same
:as
:> the gross negligence they're being accused of.
:
:I'm not sure that can fix that. Unless they add canaries to the stack
:and include other OpenBSD style W^X type checks. I mean, it's the same
:problem any OS that uses stacks faces. It's just that we now begin to
:see how things are laid out in IOS and gain information about its
:routines, how it works, and how to bypass watchdogs and such.
If you watched the presentation or have looked at anything Cisco IOS
related, you'd know that stack usage is quite limited and, if I recall,
they do have a canary-esque implementation.
:
:Cisco just has to be more careful with vulnerabilities now since they
:can be exploited better :)
:
:Cheers,
:Frank
:
:
:--
:Shame on Cisco. Double-Shame on ISS.
:
:
--
Andrew R. Reiter
arr@...son.org
Powered by blists - more mailing lists