the original cloud security
Showing 1 - 4 of 4 RSS Feed

Files

egcs-1.1-StackGuard_133_stout.tar.gz
Posted Jun 22, 2000
Site immunix.org

StackGuard is a compiler approach for defending programs and systems against "stack smashing" attacks, the most common form of security vulnerability. Programs that have been compiled with StackGuard are immune to stack smashing attacks in most cases. Protection requires no source code changes at all. When a vulnerability is exploited, StackGuard detects the attack in progress, raises an intrusion alert, and halts the victim program. This is the source package - binaries and RPM's available here.

Changes: StackGuard 2.0 is completely redesigned to integrate with the new EGCS/GCC 3.0 compiler series.
tags | tool
systems | unix
MD5 | d9a08515c299c40eeafe6f2389d9d834
gcc-2.7.2.3-14_SGc1_lite_SG12.i386.rpm
Posted Aug 17, 1999
Authored by Immunix

StackGuard is a compiler approach for defending programs and systems against "stack smashing" attacks. Stack smashing attacks are the most common form of security vulnerability. Programs that have been compiled with StackGuard are largely immune to stack smashing attacks. Protection requires no source code changes at all. When a vulnerability is exploited, StackGuard detects the attack in progress, raises an intrusion alert, and halts the victim program. Binary release, Terminator Lite: like the Terminator, but does not provide a "death handler". This allows you to customize intrusion response, and also allows you to compile very delicate packages such as glibc.

tags | tool
systems | unix
MD5 | 4421f9137a0d12f75d0502a2ad4df98a
gcc-2.7.2.3-14_SGc1_SG12.i386.rpm
Posted Aug 17, 1999
Authored by Immunix

StackGuard is a compiler approach for defending programs and systems against "stack smashing" attacks. Stack smashing attacks are the most common form of security vulnerability. Programs that have been compiled with StackGuard are largely immune to stack smashing attacks. Protection requires no source code changes at all. When a vulnerability is exploited, StackGuard detects the attack in progress, raises an intrusion alert, and halts the victim program. Binary release, Terminator canary mechanism.

tags | tool
systems | unix
MD5 | 7f948d07032f922beadce521d0d79642
gcc-2.7.2.3-14_SGc2_SG12.i386.rpm
Posted Aug 17, 1999
Authored by Immunix

StackGuard is a compiler approach for defending programs and systems against "stack smashing" attacks. Stack smashing attacks are the most common form of security vulnerability. Programs that have been compiled with StackGuard are largely immune to stack smashing attacks. Protection requires no source code changes at all. When a vulnerability is exploited, StackGuard detects the attack in progress, raises an intrusion alert, and halts the victim program. Binary release, Terminator Random: uses the more secure Random Canary protection.

tags | tool
systems | unix
MD5 | e5894fb22be071304754d581f8638459
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
UK TV Drama About North Korea Hit By Hackers
Posted Oct 17, 2017

tags | headline, hacker, government, britain, cyberwar, korea
Russia Tweaks Telegram With Tiny Fine For Decryption Denial
Posted Oct 17, 2017

tags | headline, government, privacy, russia, cryptography
Never Mind The WPA2 Drama... Details Emerge Of TPM Key Fail
Posted Oct 17, 2017

tags | headline, wireless, flaw, cryptography
Millions Of High Security Crypto Keys Crippled By Newly Discovered Flaw
Posted Oct 16, 2017

tags | headline, flaw, cryptography
Pizza Hut Latest To Be Hit In Card Data Breach
Posted Oct 16, 2017

tags | headline, hacker, privacy, bank, cybercrime, data loss, fraud
Artificial Intelligence - Hype, Hope, And Fear
Posted Oct 16, 2017

tags | headline, botnet, cyberwar
KRACK Attacks: Breaking WPA2 By Forcing Nonce Reuse
Posted Oct 16, 2017

tags | headline, privacy, phone, wireless, flaw, cryptography
Even Pokemon Go Was Used By Russia To Meddle In The Election
Posted Oct 13, 2017

tags | headline, government, usa, russia, cyberwar
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close