lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050729202133.P86052@fledge.watson.org> Date: Sat Jul 30 01:22:52 2005 From: arr at watson.org (Andrew R. Reiter) Subject: Cisco IOS Shellcode Presentation On Fri, 29 Jul 2005, Frank Knobbe wrote: :On Fri, 2005-07-29 at 18:57 -0500, J.A. Terranson wrote: :> They fucked up. They'll have to fix it then. But thats not the same :as :> the gross negligence they're being accused of. : :I'm not sure that can fix that. Unless they add canaries to the stack :and include other OpenBSD style W^X type checks. I mean, it's the same :problem any OS that uses stacks faces. It's just that we now begin to :see how things are laid out in IOS and gain information about its :routines, how it works, and how to bypass watchdogs and such. If you watched the presentation or have looked at anything Cisco IOS related, you'd know that stack usage is quite limited and, if I recall, they do have a canary-esque implementation. : :Cisco just has to be more careful with vulnerabilities now since they :can be exploited better :) : :Cheers, :Frank : : :-- :Shame on Cisco. Double-Shame on ISS. : : -- Andrew R. Reiter arr@...son.org
Powered by blists - more mailing lists