Bugtraq mailing list archives
Re: fixing all buffer overflows --- random magin numbers
From: nmanisca () VT EDU (nm)
Date: Sun, 12 Sep 1999 20:43:42 -0400
Neat idea. But, couldn't someone just take a common binary (say ls) that exists on the target system and reverse engineer it and begin to make a mapping of numbers to syscalls. Nick Maniscalco At 09:37 PM 9/11/99 -0400, Dr. Joel M. Hoffman wrote:
I was thinking --- it wouldn't be too hard to make buffer overflow attacks impossible. The basic idea is to do away with binary compatibility. In particular, I was thinking that part of building a kernel would involve assigning a random number to each syscall, and creating a syscall.h file with these random numbers. A binary would only run if it was compiled with the proper syscall.h, so all binaries would have to be recompiled for the new kernel, but then, syscall.h could be removed, and the system would be impervious to buffer overflow attacks. (One step further would involve random magic numbers in every function call.) I would be happy to give up binary compatilibyt for the added security it would add. Comments? -Joel Hoffman (joel () exc com)
Current thread:
- Re: fixing all buffer overflows --- random magin numbers nm (Sep 12)
- Re: fixing all buffer overflows --- random magin numbers Crispin Cowan (Sep 13)
- Re: fixing all buffer overflows --- random magin numbers Oliver Xymoron (Sep 17)
- Exploit for proftpd 1.2.0pre6 Tymm Twillman (Sep 20)
- Re: fixing all buffer overflows --- random magin numbers Crispin Cowan (Sep 20)
- BP9909-00: cfingerd local buffer overflow Przemyslaw Frasunek (Sep 21)
- Windows IP source routing attack Dug Song (Sep 21)
- FreeBSD-specific denial of service Charles M. Hannum (Sep 21)
- Re: FreeBSD-specific denial of service Alan Cox (Sep 22)
- Re: FreeBSD-specific denial of service Bjoern Fischer (Sep 24)
- Re: fixing all buffer overflows --- random magin numbers Oliver Xymoron (Sep 17)
- Re: fixing all buffer overflows --- random magin numbers Crispin Cowan (Sep 13)