Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-16 Thread Marcus Meissner
On Mon, Feb 16, 2009 at 09:00:33AM -0500, ArcSighter Elite wrote: James Matthews wrote: I would recommend doing the following things. 1. Ask on the Ubuntu GCC list what protection is implemented. (Or just look at the source) 2. Use GCC to see where the execution is being redirected and

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-16 Thread ArcSighter Elite
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 James Matthews wrote: I would recommend doing the following things. 1. Ask on the Ubuntu GCC list what protection is implemented. (Or just look at the source) 2. Use GCC to see where the execution is being redirected and so you can have a

[Full-disclosure] [ MDVSA-2009:037 ] bind

2009-02-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:037 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2009:038 ] blender

2009-02-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:038 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2009:039 ] gedit

2009-02-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:039 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2009:040 ] dia

2009-02-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:040 http://www.mandriva.com/security/

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-16 Thread Jubei Trippataka
memset(buf, 'A', 528); Don't do that. This sort of whoops is exactly what the gcc SSP canary is designed to stop. I could comment on this, but... I'll leave it. I have googled my brains out for a solution, but all I have gathered is that my Ubuntu's gcc is compiled with SSP and