Windows 2003 Server - Defeating the stack protection mechanism

From: NGSSoftware Insight Security Research (nisr_at_nextgenss.com)
Date: 09/11/03

  • Next message: Ingram: "Cannot access memory at address 0x90909090"
    To: <bugtraq@securityfocus.com>, <NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM>, <vulnwatch@vulnwatch.org>, <full-disclosure@lists.netsys.com>, <vuln-dev@securityfocus.com>
    Date: Thu, 11 Sep 2003 15:40:20 +0100
    
    

    For those interested, NGSS has just published a paper describing how to
    defeat the mechanism built into Windows 2003 Server to prevent exploitation
    of stack based buffer overflow vulnerabilities. Previous work done in this
    area presented methods that only worked in highly specific scenarios - the
    new methods presented in this paper are generic. The paper can be downloaded
    from http://www.nextgenss.com/papers/defeating-w2k3-stack-protection.pdf .
    Cheers,
    David Litchfield
    NGSSoftware Ltd
    http://www.nextgenss.com/
    +44(0)208 401 0070


  • Next message: Ingram: "Cannot access memory at address 0x90909090"

    Relevant Pages