comp.lang.ada
 help / color / mirror / Atom feed
From: Robert A Duff <bobduff@shell01.TheWorld.com>
Subject: Re: Partial Hardware Protection for Buffer Overrun Exploits
Date: 17 Apr 2003 17:22:04 -0400
Date: 2003-04-17T17:22:04-04:00	[thread overview]
Message-ID: <wccof34g6pv.fsf@shell01.TheWorld.com> (raw)
In-Reply-To: 3E9D8AB6.4090009@cogeco.ca

"Warren W. Gay VE3WWG" <ve3wwg@cogeco.ca> writes:

> REVIEW:
> 
> Buffer exploits work of course, by allowing the attacker to
> overwrite a buffer (array) with hacker code to be executed.
> Part of this exploit includes the necessity of overwriting
> the return address on the _stack_ frame, that the current
> function will use when it exits (opcode RET?  My assembly
> knowledge is admitedly (for Intel) is very rusty).
> 
> The RET instruction is how control is being given to planted
> "hacker code". Obviously, this is _not_ what we want
> happening on Internet exposed machines.

Overwriting the return address is probably the easiest way to gain
control, but there are lots of other writeable locations containing
addresses that will be jumped to, so the RET/RETT instruction is not the
only problem.
I also think you underestimate the danger of jumping into existing
read-only code.

When it comes to security (as opposed to normal run-of-the-mill bugs),
the chain is only as strong as its weakest link.  So if you close 99% of
the holes, you don't prevent anywhere near 99% of the problems.

It's a RISC vs CISC thing.  The RISC approach is to do bounds-checking
in software, and this has been well understood for decades (since before
RISC was invented).  So it's pretty annoying to have a hardware-based
solution, which slows down all returns (and all indirect jumps and
calls, I would claim) just because the industry is unwilling or unable
to use reasonable programming languages.

Your question is really a hardware architecture issue, so you might want
to post it to comp.arch.  In fact, I think if you search the archives,
you'll find similar ideas proposed there.

- Bob



  parent reply	other threads:[~2003-04-17 21:22 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2003-04-16 16:54 Partial Hardware Protection for Buffer Overrun Exploits Warren W. Gay VE3WWG
2003-04-16 17:28 ` Vinzent Hoefler
2003-04-17 16:33   ` Warren W. Gay VE3WWG
2003-04-17 21:29   ` Robert A Duff
2003-04-16 19:13 ` Brian Catlin
2003-04-17 15:00   ` Bob French
2003-04-17 16:14   ` Warren W. Gay VE3WWG
2003-04-17 23:22     ` Randy Brukardt
2003-04-21 16:42       ` Warren W. Gay VE3WWG
2003-04-21 17:26         ` tmoran
2003-04-22  1:40           ` Frank J. Lhota
2003-04-22 21:15             ` Robert A Duff
2003-04-22 21:19               ` Ed Falis
2003-04-24  2:00                 ` Randy Brukardt
2003-04-24 13:49                   ` Ed Falis
2003-04-24 18:42                     ` Randy Brukardt
2003-04-24 18:49                       ` Ed Falis
2003-04-17 21:22 ` Robert A Duff [this message]
2003-04-21 16:33   ` Warren W. Gay VE3WWG
2003-04-21 19:28     ` Robert A Duff
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox