|[Home] [Credit Search] [Category Browser] [Staff Roll Call]||The LINUX.COM Article Archive|
|Originally Published: Wednesday, 3 November 1999||Author: Quentin Cregan|
|Published to: news_enhance_security/Security News||Page: 1/1 - [Std View]|
Function pointer attacks leading to security compromises:
Vendicator, the author of the StackShield software has posted to BugTraq illusdtrating the dangers of Function Pointer attacks on the system. "It is simple: if a function with an overflowable buffer contains call with a function pointer declared before the buffer the attacker may overwrite the pointer with the address of the shellcode (or in the NOP block) without altering the RET address in the stack. Even if the RET is altered the shellcode is executed before the function epilog causing StackGuard and the old Stack Shield not to detect it."