[Snort-users] BO preproc exploit published

Ron Jenkins rjenkins at ...12829...
Wed Oct 26 20:00:17 EDT 2005


-----Original Message-----
From: byte_jump [mailto:bytejump at ...11827...] 
Sent: Wednesday, October 26, 2005 9:15 PM
To: Ron Jenkins
Cc: snort-users at lists.sourceforge.net
Subject: Re: [Snort-users] BO preproc exploit published

You need to have a GCC that has stack-smash-protector (SSP)
functionality. You can see if your GCC does by issuing the following
gcc -v

If your gcc has SSP built in, it will output something like this:
gcc version 3.3.4 20040623 (Gentoo Hardened Linux 3.3.4-r1,
ssp-3.3.2-2, pie-8.7.6)

The "ssp" and "pie" (Position-Independent Executable) are what you
want to see. During compilation you want to see something like
"fstack-protector" in the compilation output. You can Google for more
info, but those are the basics.

Grsecurity and PaX can be found here:

Those are patches for the Linux kernel and I highly recommend that you
read the info available on grsecurity's site. The "features" page has
quite a list describing what grsecurity does:

On 10/26/05, Ron Jenkins <rjenkins at ...12829...> wrote:
> Hello
> Do you have web links for those two? I am interested in looking at
> Thanks much...

More information about the Snort-users mailing list