Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-17 Thread Valdis . Kletnieks
On Tue, 17 Feb 2009 12:19:07 +1100, Jubei Trippataka said: memset(buf, 'A', 528); That's where the original poster is starting from... You commenting on exploitation is kind of like asking a deaf person what their favorite song is. You obviously have no clue what you are talking about due

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-16 Thread Marcus Meissner
On Mon, Feb 16, 2009 at 09:00:33AM -0500, ArcSighter Elite wrote: James Matthews wrote: I would recommend doing the following things. 1. Ask on the Ubuntu GCC list what protection is implemented. (Or just look at the source) 2. Use GCC to see where the execution is being redirected and

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-16 Thread ArcSighter Elite
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 James Matthews wrote: I would recommend doing the following things. 1. Ask on the Ubuntu GCC list what protection is implemented. (Or just look at the source) 2. Use GCC to see where the execution is being redirected and so you can have a

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-16 Thread Jubei Trippataka
memset(buf, 'A', 528); Don't do that. This sort of whoops is exactly what the gcc SSP canary is designed to stop. I could comment on this, but... I'll leave it. I have googled my brains out for a solution, but all I have gathered is that my Ubuntu's gcc is compiled with SSP and

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-14 Thread James Matthews
I would recommend doing the following things. 1. Ask on the Ubuntu GCC list what protection is implemented. (Or just look at the source) 2. Use GCC to see where the execution is being redirected and so you can have a better visual of whats going on. 3. Are you sure the stack is executable? On

[Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-13 Thread Jason Starks
I came across a problem that I am sure many security researchers have seen before: ja...@uboo:~$ cat bof.c #include stdio.h #include string.h int main() { char buf[512]; memset(buf, 'A', 528); return 0; } ja...@uboo:~$ ja...@uboo:~$ ./bof *** stack smashing detected ***: ./bof terminated

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-13 Thread Valdis . Kletnieks
On Fri, 13 Feb 2009 11:50:11 EST, Jason Starks said: memset(buf, 'A', 528); Don't do that. This sort of whoops is exactly what the gcc SSP canary is designed to stop. I have googled my brains out for a solution, but all I have gathered is that my Ubuntu's gcc is compiled with SSP and

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-13 Thread ArcSighter Elite
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 valdis.kletni...@vt.edu wrote: On Fri, 13 Feb 2009 11:50:11 EST, Jason Starks said: memset(buf, 'A', 528); Don't do that. This sort of whoops is exactly what the gcc SSP canary is designed to stop. I have googled my brains out for a

Re: [Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-13 Thread Marcus Meissner
On Fri, Feb 13, 2009 at 11:50:11AM -0500, Jason Starks wrote: I came across a problem that I am sure many security researchers have seen before: ja...@uboo:~$ cat bof.c #include stdio.h #include string.h int main() { char buf[512]; memset(buf, 'A', 528); return 0; }