Re: Stack growing and buffer overflows

=?unknown-8bit?Q?J=F6rn?= Engel (joern@wohnheim.fh-wedel.de)
Tue, 11 Mar 2003 13:23:53 +0100


On Tue, 11 March 2003 00:00:12 +0100, Felipe Alfaro Solana wrote:
>
> on x86, the stack grows downwards (from higher memory addresses to
> lower memory addresses). This makes buffer overflows attacks easy to
> exploit: if a function uses strcpy() instead of strncpy() to copy
> data [...]
>
> However, what would happen if the stack was implemented to grow
> upwards [...]

Stack overflows by mistake would go unnoticed, bad.
Stakc overflows in order to gain root privileges take only little more
effort, no change.

Nothing gained, something lost.

Jörn

-- 
Geld macht nicht glücklich.
Glück macht nicht satt.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/