Skip to content

Prevent execution of code in the stack #7

@anarchuser

Description

@anarchuser

Purpose: Function return addresses may be corrupted through buffer overflows to execute arbitrary code on the stack. To counter this, any execution of code stored in the stack ought to be detected and handled appropriately.

Implementation: Check whether current execution pointer is on the stack

Proof: Try to execute code stored in the stack and check that it's handled appropriately

Metadata

Metadata

Assignees

No one assigned

    Labels

    securityEnhances security

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions