Linux Buffer Overflow Security Exploits

Sarah Addams (s.addams@telergy.com)
Wed, 3 Mar 1999 20:07:32 -0000


This is a multi-part message in MIME format.

------=_NextPart_000_00F5_01BE65B1.78E5B790
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Excuse my ignorance, but would someone explain to me why Linux and other =
Unices are vulnerable to buffer overflow exploits? I suspect it's =
because the code, data and stack for a given process is kept in a single =
memory segment, but I'm not at all sure about that. If however, I'm =
right, would Linux Alpha, running on a Harvard architecture 21164, be =
immune from this weakness?
=20
TIA

------=_NextPart_000_00F5_01BE65B1.78E5B790
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">

Excuse my ignorance, but would someone explain to me = why Linux=20 and other Unices are vulnerable to buffer overflow exploits? I suspect = it's=20 because the code, data and stack for a given process is kept in a single = memory=20 segment, but I'm not at all sure about that. If however, I'm right, = would Linux=20 Alpha, running on a Harvard architecture 21164, be immune from this=20 weakness?
 
TIA
------=_NextPart_000_00F5_01BE65B1.78E5B790-- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/