[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Secure 2.4.x kernel



Gary MacDougall(gary@freeportweb.com)@2001.12.21 11:59:36 +0000:
> Thanks everyone for the answer.
> 
> I was pretty sure that the kernel would be able
> to detect the fault, but I needed to *make* sure
> before i asked another question.
> 
> Now heres my next questions and its a security one.
> Based off what was explained by Noah and Kelly,
> it appears to me that Buffer Overruns can be dealt
> with at the kernel level and that there is probably
> a way in the kernel to stop a root exploit during
> a buffer overrun.  Why hasn't (or maybe someone has)
> someone come up with a "ring" or security layer that
> protects against root exploits on buffer overruns?
> 
> Maybe this is totally stupid question, but I've
> been jumping into security a lot lately, and I noticed
> that most of the exploits (if not all) on Linux/Unix
> are basically buffer overrun.  After reading that
> excellent article "Smashing the stack for fun and
> profit", it became pretty clear that there are really
> two issues:
> 
> 1. Applications that allow for an overrun
> 2. The kernel allowing for the exec of a shell (ouch!).
> 
> Why not simply have a ring in the kernel that one good
> attach the processes too which protected against this?
http://www.openwall.com/linux/
The Openwall patches protect against explointing buffer overruns I
think, they're not available for 2.4 yet though.
-- 
,-------------------------------------------.
> Name:           Alson van der Meulen      <
> Personal:        alson@flutnet.org        <
> School:       alson@gymnasiumleiden.nl    <
`-------------------------------------------'
You might as well all go home early today ...
---------------------------------------------



Reply to: