<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stop stack smashing attacks in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490695#M760262</link>
    <description>Mark,&lt;BR /&gt;I checked many resources on this.... everything points to a security vulnerability on Solaris, nothing to HP-UX.&lt;BR /&gt;&lt;BR /&gt;I checked with someone who works with kernel stacks and they also have not heard anything of noexec_user_stack OR of anything that makes a stack nonexecutable.  &lt;BR /&gt;&lt;BR /&gt;This simply means that currently there is no equivalent to noexec_user_stack in HP-UX and no documented need for it, as of current versions.</description>
    <pubDate>Wed, 07 Feb 2001 13:13:35 GMT</pubDate>
    <dc:creator>Cheryl Griffin</dc:creator>
    <dc:date>2001-02-07T13:13:35Z</dc:date>
    <item>
      <title>Stop stack smashing attacks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490694#M760261</link>
      <description>Hello all,&lt;BR /&gt;&lt;BR /&gt;In sun solaris you can set a kernel parameter called noexec_user_stack which prevents an application's stack from being executable. This helps to prevent buffer overflow attacks.  Is there an equivalent parameter that can be set in HP-UX?  I'm running HP-UX 11.00.01 on a L2000&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Mark</description>
      <pubDate>Wed, 07 Feb 2001 11:38:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490694#M760261</guid>
      <dc:creator>Mark Ferraretto</dc:creator>
      <dc:date>2001-02-07T11:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: Stop stack smashing attacks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490695#M760262</link>
      <description>Mark,&lt;BR /&gt;I checked many resources on this.... everything points to a security vulnerability on Solaris, nothing to HP-UX.&lt;BR /&gt;&lt;BR /&gt;I checked with someone who works with kernel stacks and they also have not heard anything of noexec_user_stack OR of anything that makes a stack nonexecutable.  &lt;BR /&gt;&lt;BR /&gt;This simply means that currently there is no equivalent to noexec_user_stack in HP-UX and no documented need for it, as of current versions.</description>
      <pubDate>Wed, 07 Feb 2001 13:13:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490695#M760262</guid>
      <dc:creator>Cheryl Griffin</dc:creator>
      <dc:date>2001-02-07T13:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: Stop stack smashing attacks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490696#M760263</link>
      <description>Actually, I think that the vulnerability is a cross-platform one.  All applications have a heap and a stack as part of their run-time structure.  A stack-smashing attack inserts pointers into the stack and then uses code that executes the code the pointer in the stack refers to.  This is a common buffer overflow attack.&lt;BR /&gt;&lt;BR /&gt;A solution is to tell the kernel to make the stack non-executable.  This means that code cannot be executed from the stack and so prevents the problem.&lt;BR /&gt;&lt;BR /&gt;On Solaris, you tell the kernel to make the stack non-executable by setting the kernel parameter I described above.  I was hoping there might be a similar type of parameter under HP-UX.&lt;BR /&gt;&lt;BR /&gt;If the vulnerability is with Solaris only, then this means that the stack on HP-UX systems is non-executable by default.  Can you confirm this?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Mark</description>
      <pubDate>Thu, 08 Feb 2001 02:04:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490696#M760263</guid>
      <dc:creator>Mark Ferraretto</dc:creator>
      <dc:date>2001-02-08T02:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Stop stack smashing attacks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490697#M760264</link>
      <description>Compile then run the attached GCC program. trampolines are on the stack. Even without executable stack the return address might be smashed to point to a dangerous location (say reboot!)&lt;BR /&gt;This example is derived from &lt;A href="http://www.uwsg.iu.edu/hypermail/linux/kernel/0006.0/0703.html" target="_blank"&gt;http://www.uwsg.iu.edu/hypermail/linux/kernel/0006.0/0703.html&lt;/A&gt;</description>
      <pubDate>Thu, 08 Feb 2001 05:21:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490697#M760264</guid>
      <dc:creator>Len Lattanzi</dc:creator>
      <dc:date>2001-02-08T05:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: Stop stack smashing attacks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490698#M760265</link>
      <description>FYI,&lt;BR /&gt;&lt;BR /&gt;HP-UX 11i: New security features &lt;BR /&gt;&lt;BR /&gt;executable_stack Kernel Parameter&lt;BR /&gt;&lt;BR /&gt;It is now possible change the executable_stack tunable kernel parameter&lt;BR /&gt;to zero in order to protect program stacks against attacks that cause&lt;BR /&gt;buffer overflows.&lt;BR /&gt;&lt;BR /&gt;You can change the executable_stack parameter as follows:&lt;BR /&gt;&lt;BR /&gt;- Use the System Administration Manager (SAM) to change the parameter for&lt;BR /&gt;all programs.&lt;BR /&gt;&lt;BR /&gt;- Use chatr(1) with its es option to change the parameter for specific programs.&lt;BR /&gt;&lt;BR /&gt;Changes were made to the kernel execve() function, to virtual memory&lt;BR /&gt;code, and to the chatr(1) and elfdump(1) commands.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 08 Feb 2001 07:57:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/stop-stack-smashing-attacks/m-p/2490698#M760265</guid>
      <dc:creator>Magnus Ljung</dc:creator>
      <dc:date>2001-02-08T07:57:28Z</dc:date>
    </item>
  </channel>
</rss>

