The tag has no usage guidance.

learn more… | top users | synonyms

33
votes
3answers
8k views

How big is a canary word on Linux, typically?

A canary word is a sequence of bits placed at the boundary between a buffer (such as a stack) and control data in a program, as a way of detecting and reacting to buffer overflows. How many bits long ...
1
vote
1answer
25 views

Restoring the stack frame after payload is executed

Is it possible to restore the stack frame so that the EIP returns to the place that is was at(before the overflow) after a payload has been executed? If a stack frame is overflowed and the payload ...
0
votes
2answers
198 views

Why must a ret2libc attack follow the order "system(),exit(),command?

In a ret2libc attack, I understand that the return address can be overwritten with the address of the system command, which takes a command string as an argument. In this case, shouldn't the address ...
2
votes
2answers
79 views

Can one prevent stack overflow by storing strings in memory backwards?

Normal use: ------(buffer)------ --(ret)--- DDDDDDDDEEEEEEEEEEEE EEEE FFFF 89ABCDEF0123456789AB CDEF 0123 this is a string\0 bff5 a400 Stack overflowed: ------(buffer)------ --(...
2
votes
3answers
197 views

If the stack grows downwards, how can a buffer overflow overwrite content above the variable?

I realize how a buffer overflow works but I have a problem understanding the direction in which the overflow is directed. So if the stack grows downwards, that means that the return address is above ...
0
votes
0answers
87 views

Is it possible to bypass stack protector (SSP)?

is it possible to exploit a simple stack buffer overflow vulnerability with stack smashing protector enabled? For example, this line of code code is vulnerable to a stack buffer overflow, is it ...