3

Possible Duplicate:
How to disable address space randomization for a binary on Linux?

Is there a system call / library in C that will stabalize the program's stack, and stop the OS from randomizing the stack 's position?

Community
  • 1
  • 1
darksky
  • 20,411
  • 61
  • 165
  • 254
  • Out of curiosity, why would you want to disable it? (PS `sysctl -w kernel.randomize_va_space=0` appears to work for Gentoo) – obataku Sep 16 '12 at 02:08
  • stack randomization is a security measure to mitigate stack smashing attacks. Disabling it essentially opens the front door for malware to walk in. – Marc B Sep 16 '12 at 02:09
  • 2
    @MarcB that's a bit of a drastic slippery slope... I agree that there's virtually no reason to disable it, but it's not opening a front door for malware. – obataku Sep 16 '12 at 02:10
  • I am aware of that. I was working on a `buffer bomb` project and was just wondering how they are achieving stack stabilization that allow basic stack-based exploitations work. That's it :) – darksky Sep 16 '12 at 02:17

0 Answers0