Re: protection against buffer overflows

2002-01-24 Thread Preben Randhol
And if one do: procedure example is type C_String_Type is array (1..10) of Character; a : C_String_type; begin a := ('1','2','3','4','5','6','7','8','9','A','B','C','D'); end example; then when compiling: % gnatmake example.adb gnatgcc -c example.adb example.

Re: protection against buffer overflows

2002-01-24 Thread Preben Randhol
Alvin Oga <[EMAIL PROTECTED]> wrote on 24/01/2002 (11:13) : > > hi ya ralf > > i would have thought that gcc would barf on b[20]='X' > and similarly for theother variable assignments since its not prev > allocated/defined.. and yet explicitly assigned (incorrectly??)... Why there are no range te

Re: protection against buffer overflows

2002-01-24 Thread Preben Randhol
And if one do: procedure example is type C_String_Type is array (1..10) of Character; a : C_String_type; begin a := ('1','2','3','4','5','6','7','8','9','A','B','C','D'); end example; then when compiling: % gnatmake example.adb gnatgcc -c example.adb example

Re: protection against buffer overflows

2002-01-24 Thread Preben Randhol
Alvin Oga <[EMAIL PROTECTED]> wrote on 24/01/2002 (11:13) : > > hi ya ralf > > i would have thought that gcc would barf on b[20]='X' > and similarly for theother variable assignments since its not prev > allocated/defined.. and yet explicitly assigned (incorrectly??)... Why there are no range t

Re: protection against buffer overflows

2002-01-24 Thread Alan James
On Wed, 23 Jan 2002 18:03:26 -0500 (EST), Emmanuel Valliet <[EMAIL PROTECTED]> wrote: >There was a good article of Aleph One on buffer overflows called >'Smashing the stack for fun and profit'. Phrack 49. >Search the web and enjoy :) I found this one to be quite informative too: http://www.cultd

Re: protection against buffer overflows

2002-01-24 Thread Alan James
On Wed, 23 Jan 2002 18:03:26 -0500 (EST), Emmanuel Valliet <[EMAIL PROTECTED]> wrote: >There was a good article of Aleph One on buffer overflows called >'Smashing the stack for fun and profit'. Phrack 49. >Search the web and enjoy :) I found this one to be quite informative too: http://www.cult

Re: protection against buffer overflows

2002-01-23 Thread Alvin Oga
hi ya ralf i would have thought that gcc would barf on b[20]='X' and similarly for theother variable assignments since its not prev allocated/defined.. and yet explicitly assigned (incorrectly??)... its lot harder to control when the coder does strcpy or readln() without first chcking the length

Re: protection against buffer overflows

2002-01-23 Thread Vincent
Here is a simple example with shellcode. It will give you a nice shell if there's a /bin/sh on your system : -- #include #include char shellcode[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"

Re: protection against buffer overflows

2002-01-23 Thread Steve Johnson
> #include > > void example() > { > char a[10]; > char b[10]; > strcpy(a, "123456789"); > printf ("a: %s\n", a); > b[20]='X'; > b[21]='Y'; > b[22]='Z'; > printf("a: %s\n", a); > return; > } > main() > { > example(); > } Ralf, i ran this code very interesting results, how? i woul

Re: protection against buffer overflows

2002-01-23 Thread Ralf Dreibrodt
hi, > anyone to offer any > explanation will be showered with greatness! here is an example: #include void example() { char a[10]; char b[10]; strcpy(a, "123456789"); printf ("a: %s\n", a); b[20]='X'; b[21]='Y'; b[22]='Z'; printf("a: %s\n", a); return; } main() { example();

Re: protection against buffer overflows

2002-01-23 Thread Alvin Oga
hi ya ralf i would have thought that gcc would barf on b[20]='X' and similarly for theother variable assignments since its not prev allocated/defined.. and yet explicitly assigned (incorrectly??)... its lot harder to control when the coder does strcpy or readln() without first chcking the lengt

RE: protection against buffer overflows

2002-01-23 Thread Emmanuel Valliet
(2002-01-23) Steve Johnson sed : | this may seem trivial but i've never really understood how a buffer | overflow happens and effects your system, i have some knowledge of | programming, but not much at low levels. like dealing direct with | memory or devices(other than using standard pointer

RE: protection against buffer overflows

2002-01-23 Thread Alvin Oga
hi ya steve... when you write a program... you usually pass variables around... the system keeps a "stack of return address/variables" ..what to do next... the rootkits tries to make the return address of "foo" program to give them root access.. - so much for my simplied one-liners.. - a simp

RE: protection against buffer overflows

2002-01-23 Thread Steve Johnson
this may seem trivial but i've never really understood how a buffer overflow happens and effects your system, i have some knowledge of programming, but not much at low levels. like dealing direct with memory or devices(other than using standard pointers and reading and writing to devices thruough

Re: protection against buffer overflows

2002-01-23 Thread Vincent
Here is a simple example with shellcode. It will give you a nice shell if there's a /bin/sh on your system : -- #include #include char shellcode[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"

Re: protection against buffer overflows

2002-01-23 Thread Steve Johnson
> #include > > void example() > { > char a[10]; > char b[10]; > strcpy(a, "123456789"); > printf ("a: %s\n", a); > b[20]='X'; > b[21]='Y'; > b[22]='Z'; > printf("a: %s\n", a); > return; > } > main() > { > example(); > } Ralf, i ran this code very interesting results, how? i wou

Re: protection against buffer overflows

2002-01-23 Thread Ralf Dreibrodt
hi, > anyone to offer any > explanation will be showered with greatness! here is an example: #include void example() { char a[10]; char b[10]; strcpy(a, "123456789"); printf ("a: %s\n", a); b[20]='X'; b[21]='Y'; b[22]='Z'; printf("a: %s\n", a); return; } main() { example();

RE: protection against buffer overflows

2002-01-23 Thread Emmanuel Valliet
(2002-01-23) Steve Johnson sed : | this may seem trivial but i've never really understood how a buffer | overflow happens and effects your system, i have some knowledge of | programming, but not much at low levels. like dealing direct with | memory or devices(other than using standard pointe

RE: protection against buffer overflows

2002-01-23 Thread Alvin Oga
hi ya steve... when you write a program... you usually pass variables around... the system keeps a "stack of return address/variables" ..what to do next... the rootkits tries to make the return address of "foo" program to give them root access.. - so much for my simplied one-liners.. - a sim

RE: protection against buffer overflows

2002-01-23 Thread Steve Johnson
this may seem trivial but i've never really understood how a buffer overflow happens and effects your system, i have some knowledge of programming, but not much at low levels. like dealing direct with memory or devices(other than using standard pointers and reading and writing to devices thruoug

Re: protection against buffer overflows

2002-01-23 Thread Rolf Kutz
[EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote: > > it indeed sounds VERY interesting (not only to me) :-) > although I never dealt with special kernel modifications. > But I'll give it a go..can anyone recommend any other > kernel security patch sites? ..would be great! I never tested it, but it lo

RE: protection against buffer overflows

2002-01-23 Thread Lars Bahner
On Fri, 2002-01-18 at 22:15, Hassard, Stephen wrote: > I'm not sure if anyone has tried this one, but a fairly extensive patch set > for the 2.4 series of kernels is available called grsecurity > (http://www.grsecurity.net). It includes whole whacks of stuff (take a look > at the "features" page ht

Re: protection against buffer overflows

2002-01-19 Thread Preben Randhol
Tim Uckun <[EMAIL PROTECTED]> wrote on 19/01/2002 (10:16) : > > >Has anyone any interesting comments about theses methods ? > > There are also alternative languages like cyclone > http://www.research.att.com/projects/cyclone/ (which is based on C) and of > course you could use a high level angu

Re: protection against buffer overflows

2002-01-19 Thread Harald Skoglund
On Friday 18. January 2002 21:33, Alvin Oga wrote: > openwall works only w/ 2.2.x kernels unless they've released 2.4.x stuff I beleive it has been ported to linux kernel 2.4 in grsecurity. http://grsecurity.net/ -- Harald Skoglund

Re: protection against buffer overflows

2002-01-19 Thread Alvin Oga
hi ya pav good examples... for more code checkers..( looking for bad code ) http://www.Linux-Sec.net/Audit/audit_tools.gwif.html#Code have fun linuxing alvin On Sat, 19 Jan 2002, Pavel Minev Penev wrote: > On Fri, Jan 18, 2002 at 09:20:16PM +0100, Vincent wrote: > > Hi all ! > > >

Re: protection against buffer overflows

2002-01-19 Thread Preben Randhol
Tim Uckun <[EMAIL PROTECTED]> wrote on 19/01/2002 (10:16) : > > >Has anyone any interesting comments about theses methods ? > > There are also alternative languages like cyclone > http://www.research.att.com/projects/cyclone/ (which is based on C) and of > course you could use a high level ang

Re: protection against buffer overflows

2002-01-19 Thread Gergely Trifonov
code execution on the stack: http://packetstorm.linuxsecurity.com/mag/phrack/phrack58.tar.gz - Original Message - From: Vincent <[EMAIL PROTECTED]> To: Sent: Saturday, January 19, 2002 4:11 PM Subject: Re: protection against buffer overflows >

Re: protection against buffer overflows

2002-01-19 Thread Harald Skoglund
On Friday 18. January 2002 21:33, Alvin Oga wrote: > openwall works only w/ 2.2.x kernels unless they've released 2.4.x stuff I beleive it has been ported to linux kernel 2.4 in grsecurity. http://grsecurity.net/ -- Harald Skoglund -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a su

Re: protection against buffer overflows

2002-01-19 Thread Vincent
Hi all, and thanx for your help on this subject ! So far, I've seen mainly 3 methods to fight against buffer overflows : 1/ Kernel-patching oriented methods, to prevent any execution in the stack 2/ Libsafe's overwriting of vulnerable functions, in a lib loaded bef

Re: protection against buffer overflows

2002-01-19 Thread Alvin Oga
hi ya pav good examples... for more code checkers..( looking for bad code ) http://www.Linux-Sec.net/Audit/audit_tools.gwif.html#Code have fun linuxing alvin On Sat, 19 Jan 2002, Pavel Minev Penev wrote: > On Fri, Jan 18, 2002 at 09:20:16PM +0100, Vincent wrote: > > Hi all ! > > >

Re: protection against buffer overflows

2002-01-19 Thread Pavel Minev Penev
On Fri, Jan 18, 2002 at 09:20:16PM +0100, Vincent wrote: > Hi all ! > > I'm working on buffer overflows these days, and more precisely the possible > methods to avoid them. > It seems that the most used tools to prevent exploits based on buffer > overflows are Libsafe, OpenWall, StackGuard... and

Re: protection against buffer overflows

2002-01-19 Thread Gergely Trifonov
code execution on the stack: http://packetstorm.linuxsecurity.com/mag/phrack/phrack58.tar.gz - Original Message - From: Vincent <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Saturday, January 19, 2002 4:11 PM Subject: Re: protection against buffer overflows > -- To U

Re: protection against buffer overflows

2002-01-19 Thread Vincent
Hi all, and thanx for your help on this subject ! So far, I've seen mainly 3 methods to fight against buffer overflows : 1/ Kernel-patching oriented methods, to prevent any execution in the stack 2/ Libsafe's overwriting of vulnerable functions, in a lib loaded be

Re: protection against buffer overflows

2002-01-19 Thread Gergely Trifonov
you should check out PaX as well: http://pageexec.virtualave.net they got stuff for both 2.2.x and 2.4.x - Original Message - From: Vincent <[EMAIL PROTECTED]> To: Sent: Friday, January 18, 2002 9:20 PM Subject: protection against buffer overflows >

Re: protection against buffer overflows

2002-01-19 Thread Pavel Minev Penev
On Fri, Jan 18, 2002 at 09:20:16PM +0100, Vincent wrote: > Hi all ! > > I'm working on buffer overflows these days, and more precisely the possible > methods to avoid them. > It seems that the most used tools to prevent exploits based on buffer > overflows are Libsafe, OpenWall, StackGuard... and

Re: protection against buffer overflows

2002-01-19 Thread Gergely Trifonov
you should check out PaX as well: http://pageexec.virtualave.net they got stuff for both 2.2.x and 2.4.x - Original Message - From: Vincent <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, January 18, 2002 9:20 PM Subject: protection against buffer overflows > -- To UNSUBS

RE: protection against buffer overflows

2002-01-18 Thread Hassard, Stephen
c: debian-security@lists.debian.org > Subject: Re: protection against buffer overflows > > > > hi ya vincent > > > I'm working on buffer overflows these days, and more precisely the > > possible methods to avoid them. It seems that the most used > tools

Re: protection against buffer overflows

2002-01-18 Thread Tim Uckun
Has anyone any interesting comments about theses methods ? There are also alternative languages like cyclone http://www.research.att.com/projects/cyclone/ (which is based on C) and of course you could use a high level anguage like pyton, perl, java, scheme etc. :wq Tim Uckun US Investiga

Re: protection against buffer overflows

2002-01-18 Thread Alvin Oga
hi ya vincent > I'm working on buffer overflows these days, and more precisely the possible > methods to avoid them. > It seems that the most used tools to prevent exploits based on buffer > overflows are Libsafe, OpenWall, StackGuard... and maybe Saint Jude. > > Has anyone any interesting comm

RE: protection against buffer overflows

2002-01-18 Thread Hassard, Stephen
Cc: [EMAIL PROTECTED] > Subject: Re: protection against buffer overflows > > > > hi ya vincent > > > I'm working on buffer overflows these days, and more precisely the > > possible methods to avoid them. It seems that the most used > tools

Re: protection against buffer overflows

2002-01-18 Thread Tim Uckun
>Has anyone any interesting comments about theses methods ? There are also alternative languages like cyclone http://www.research.att.com/projects/cyclone/ (which is based on C) and of course you could use a high level anguage like pyton, perl, java, scheme etc. :wq Tim Uckun US Investigati

Re: protection against buffer overflows

2002-01-18 Thread Alvin Oga
hi ya vincent > I'm working on buffer overflows these days, and more precisely the possible > methods to avoid them. > It seems that the most used tools to prevent exploits based on buffer > overflows are Libsafe, OpenWall, StackGuard... and maybe Saint Jude. > > Has anyone any interesting com