Exploiting Fedora Core 2

Tags:

Paper: How to exploit overflow vulnerability under Fedora Core 2
FEDORA CORE2에서 EXEC-SHIELD를 우회하여 STACK 기반 OVERFLOW 공격 기법 한번에 성공하기


 +———————-+———————–+———————+
 |                      |   Red HaT LINUX 9.0   |    Fedora CORE2     |
 |———————-+———————–+———————+
 | Random Stack         |          O            |          O          |
 |———————-+———————–+———————+
 | Non-executable Stack |          x            |          O          |
 +———————-+———————–+———————+
 | Random Library       |          x            |          O          |
 +———————-+———————–+———————+

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *