On Tue, 11 March 2003 00:00:12 +0100, Felipe Alfaro Solana wrote:
>
> on x86, the stack grows downwards (from higher memory addresses to
> lower memory addresses). This makes buffer overflows attacks easy to
> exploit: if a function uses strcpy() instead of strncpy() to copy
> data [...]
>
> However, what would happen if the stack was implemented to grow
> upwards [...]
Stack overflows by mistake would go unnoticed, bad.
Stakc overflows in order to gain root privileges take only little more
effort, no change.
Nothing gained, something lost.
Jörn
-- Geld macht nicht glücklich. Glück macht nicht satt. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sat Mar 15 2003 - 22:00:25 EST