| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: ASLR and safe exceptions |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0477_01C684F4.3A3B2880
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Safe exceptions are implemented starting in Windows Server 2003 and =
Windows XP SP2. From the tools side, support was introduced in Visual =
Studio.NET 2003. While Mike Howard's blog entry on address =
randomization, =
http://blogs.msdn.com/michael_howard/archive/2006/05/26/608315.aspx, =
mentions this and other defense mechanisms, they are all orthogonal.
And in case anyone really was that stupid, mike miller's bullshit is =
just that.
Rich
"Rich Gauszka" wrote in message =
news:447e1e4e{at}w3.nls.net...
Does that mean they won't use the Shupak patent? < name could be a=20
coincidence though >
=
http://www.freshpatents.com/Safe-exceptions-dt20041230ptan20040268365.php=
"/m" wrote in message=20
news:kp5s72p1duen4gjrcr64rm3tpr51lt1m3g{at}4ax.com...
>
> http://www.theinquirer.net/?article=3D32075
>
> =3D=3D=3D
> AN OPEN SAUCE security feature is being used by Microsoft to protect =
its
> new super soar-away operating system, Vista, from buffer overrun
> exploits.
>
> The feature, called Address Space Layout Randomization (ALSR) has =
been
> sneaked under the bonnet of Windows Vista Beta 2 as part of a larger
> plan to make it more difficult to automate attacks against the =
operating
> system.
>
> ALSR randomly arranges the positions of key data areas to prevent
> malicious hackers from predicting target addresses.
>
> The Vole's senior security program manager, Michael Howard told =
readers
> of his bog that it was switched on by default, too.
>
> Howard said the software was added late in the game and that =
sticking on
> by default it gave the Vole the chance to see how it performs.
>
> He said it could serve as a "useful defence" against malware =
attacks. It
> is a feature of OpenBSD, PaX and Exec Shield.
> =3D=3D=3D
>
> Added late in the game, eh? Hmmm.... Wouldn't surprise me if the =
best
> and brightest in Redmond copied the OpenBSD code. It's under the =
very
> free BSD license, and Microsoft does like to copy their "innovation"
> from others.
>
>
> /m=20
------=_NextPart_000_0477_01C684F4.3A3B2880
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Safe
exceptions are =
implemented=20
starting in Windows Server 2003 and Windows XP SP2. From the
tools = side,=20
support was introduced in Visual Studio.NET 2003. While Mike =
Howard's blog=20
entry on address randomization, http://blogs.msdn.com/michael_howard/archive/2006/05/26/608315.as=
px">http://blogs.msdn.com/michael_howard/archive/2006/05/26/608315.aspx=
A>, mentions=20
this and other defense mechanisms, they are all orthogonal.
And in
case anyone really =
was that=20
stupid, mike miller's bullshit is just that.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.