Linux Buffer Overflow Security Exploits
Sarah Addams (s.addams@telergy.com)
Wed, 3 Mar 1999 20:07:32 -0000
This is a multi-part message in MIME format.
------=_NextPart_000_00F5_01BE65B1.78E5B790
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Excuse my ignorance, but would someone explain to me why Linux and other =
Unices are vulnerable to buffer overflow exploits? I suspect it's =
because the code, data and stack for a given process is kept in a single =
memory segment, but I'm not at all sure about that. If however, I'm =
right, would Linux Alpha, running on a Harvard architecture 21164, be =
immune from this weakness?
=20
TIA
------=_NextPart_000_00F5_01BE65B1.78E5B790
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
Excuse my ignorance, but would someone explain to me =
why Linux=20
and other Unices are vulnerable to buffer overflow exploits? I suspect =
it's=20
because the code, data and stack for a given process is kept in a single =
memory=20
segment, but I'm not at all sure about that. If however, I'm right, =
would Linux=20
Alpha, running on a Harvard architecture 21164, be immune from this=20
weakness?
TIA
------=_NextPart_000_00F5_01BE65B1.78E5B790--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/