"Strong" stack protection for GCC
"Strong" stack protection for GCC
Posted Feb 13, 2014 20:59 UTC (Thu) by fw (subscriber, #26023)In reply to: "Strong" stack protection for GCC by jtc
Parent article: "Strong" stack protection for GCC
There are cases where a buffer overflow is exploitable even without overwriting addresses and redirecting execution. A good example is CVE-2001-0797, where you could overwrite the variable which indicated that the user has authenticated successfully.
