Hacker News new | past | comments | ask | show | jobs | submit login

Re: the second question, the problem with NX is that it only protects you from overflows where the attacker jumps into the buffer.

Overflows are still exploitable with NX. The attacker instead jumps to a series of fragments of library code[1]. Since libraries will always be executable, there's no problem (aside from the difficulty of finding the right chain of "gadgets").

ASLR goes some way into preventing return oriented programming (ROP) attacks, but it isn't bulletproof.

[1] : http://en.wikipedia.org/wiki/Return-oriented_programming




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: