"Strong" stack protection for GCC
"Strong" stack protection for GCC
Posted Feb 14, 2014 5:06 UTC (Fri) by ewimberley (guest, #95544)In reply to: "Strong" stack protection for GCC by jtc
Parent article: "Strong" stack protection for GCC
Integer overflows/underflows are an example of a write-what-where that allows you to skip the canary completely. If your corruption target is referenced before function return then you can write over the canary without fear of triggering a stack check. In this case the target can be anywhere higher in memory than the overflow (even in another stack frame completely).
If you want a bunch of examples check the code in my github repo:
https://github.com/ewimberley/AdvancedMemoryChallenges
