lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20051011091432.47918.qmail@web25501.mail.ukl.yahoo.com> Date: Tue Oct 11 10:14:40 2005 From: wh1t3h4t3 at yahoo.co.uk (Micheal Turner) Subject: http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt Linux kernel recently incorporated a protection which randomizes the stack making exploitation of stack based overflows more difficult. I present here an attack which works on exploiting static addresses in Linux. You should be familiar with standard stack smashing before attempting this paper. Thank you. ___________________________________________________________ To help you stay safe and secure online, we've developed the all new Yahoo! Security Centre. http://uk.security.yahoo.com