[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Rep:Re: Rep:Re: Rep:Re: [f-cpu] TLB right + resume



-----Message d'origine-----
De: Michael Riepe <michael@stud.uni-hannover.de>
A: f-cpu@seul.org
Date: 21/08/02
Objet: Re: Rep:Re: Rep:Re: [f-cpu] TLB right + resume

On Wed, Aug 21, 2002 at 02:58:35AM -0700, John Graley wrote:
[...]
> Surely it would be a simple matter in software to search through
executables
> looking for the op-codes of illegal instructions before execution?

That's not simple at all. Especially if these instructions are allowed
in certain places (stack write) but not in any others.

>>> The "real" answer is that we never mind that a user of the system
could forge a program to breack it's own program. What interrest to try
to catch right that the user already have ? (the main goal of an attack
is to obtain a shell with the user root)
>>> And for the kernel, it's even simple : no user could execute code in
superuse mode, so it's over.
nicO

-- 
 Michael "Tired" Riepe <Michael.Riepe@stud.uni-hannover.de>
 "All I wanna do is have a little fun before I die"
*************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe f-cpu       in the body. http://f-cpu.seul.org/


______________________________________________________________________________
Pour mieux recevoir vos emails, utilisez un PC plus performant !
Découvrez la nouvelle gamme DELL en exclusivité sur i (france)
http://www.ifrance.com/_reloc/signhdell

*************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe f-cpu       in the body. http://f-cpu.seul.org/