- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Stop stack smashing attacks
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2001 03:38 AM
02-07-2001 03:38 AM
Stop stack smashing attacks
In sun solaris you can set a kernel parameter called noexec_user_stack which prevents an application's stack from being executable. This helps to prevent buffer overflow attacks. Is there an equivalent parameter that can be set in HP-UX? I'm running HP-UX 11.00.01 on a L2000
Thanks
Mark
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2001 05:13 AM
02-07-2001 05:13 AM
Re: Stop stack smashing attacks
I checked many resources on this.... everything points to a security vulnerability on Solaris, nothing to HP-UX.
I checked with someone who works with kernel stacks and they also have not heard anything of noexec_user_stack OR of anything that makes a stack nonexecutable.
This simply means that currently there is no equivalent to noexec_user_stack in HP-UX and no documented need for it, as of current versions.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2001 06:04 PM
02-07-2001 06:04 PM
Re: Stop stack smashing attacks
A solution is to tell the kernel to make the stack non-executable. This means that code cannot be executed from the stack and so prevents the problem.
On Solaris, you tell the kernel to make the stack non-executable by setting the kernel parameter I described above. I was hoping there might be a similar type of parameter under HP-UX.
If the vulnerability is with Solaris only, then this means that the stack on HP-UX systems is non-executable by default. Can you confirm this?
Thanks
Mark
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2001 09:21 PM
02-07-2001 09:21 PM
Re: Stop stack smashing attacks
This example is derived from http://www.uwsg.iu.edu/hypermail/linux/kernel/0006.0/0703.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2001 11:57 PM
02-07-2001 11:57 PM
Re: Stop stack smashing attacks
HP-UX 11i: New security features
executable_stack Kernel Parameter
It is now possible change the executable_stack tunable kernel parameter
to zero in order to protect program stacks against attacks that cause
buffer overflows.
You can change the executable_stack parameter as follows:
- Use the System Administration Manager (SAM) to change the parameter for
all programs.
- Use chatr(1) with its es option to change the parameter for specific programs.
Changes were made to the kernel execve() function, to virtual memory
code, and to the chatr(1) and elfdump(1) commands.