Is buffer overflow to stack space, for arbitrary code execution going to be dead in the near future?
From the early attempts to "fix" this with the use of canaries in StackGuard, through to Operating Systems supporting Non-Executable Stack Space, to the more recent addition of support in chips for "NoExecute" on segments (assuming OS support is included) and the newer variations of encrypted return addresses also acting as canaries as well as dynamic relocation of address of programs as they are started (to ruin prepackaged jump addresses for exploits) and the many others, what is the future of buffer overruns as a stack overflow and arbitrary code execution method of entry?
And the next question, if we assume that all of these work-arounds actually prevent execution of arbitrary code on stacks as pushed through buffer overruns, will this encourage MORE bad coding? Will lack of attention to "security issues of buffer overruns" cause businesses to care less about such bugs, and leave more crappy software without fixes?
(I know there are people who are professionals here, but I'm not sure they'll want to talk "work" while on the forums. If this thread goes nowhere, I totally understand.)
[Added:]
x86-64 and page permissions. (From Bascule)
(PDF) On StackGuard and use of canaries and gcc
From the early attempts to "fix" this with the use of canaries in StackGuard, through to Operating Systems supporting Non-Executable Stack Space, to the more recent addition of support in chips for "NoExecute" on segments (assuming OS support is included) and the newer variations of encrypted return addresses also acting as canaries as well as dynamic relocation of address of programs as they are started (to ruin prepackaged jump addresses for exploits) and the many others, what is the future of buffer overruns as a stack overflow and arbitrary code execution method of entry?
And the next question, if we assume that all of these work-arounds actually prevent execution of arbitrary code on stacks as pushed through buffer overruns, will this encourage MORE bad coding? Will lack of attention to "security issues of buffer overruns" cause businesses to care less about such bugs, and leave more crappy software without fixes?
(I know there are people who are professionals here, but I'm not sure they'll want to talk "work" while on the forums. If this thread goes nowhere, I totally understand.)
[Added:]
x86-64 and page permissions. (From Bascule)
(PDF) On StackGuard and use of canaries and gcc
Comment