Microsoft Visual C++ 7/Visual...

- AV AC AU C I A
发布: 2002-02-14
修订: 2025-04-13

The Microsoft Visual C++ 7 and Visual C++.Net compilers shipped by Microsoft include a feature to help protect against stack-based buffer overflow conditions. The technology is similar to StackGuard, which was developed by Crispin Cowan. The buffer overflow protection is implemented using special values (called 'security cookies') positioned next to function stack frames when procedures are called. When a procedure exits, the value is checked for it's integrity. If the check fails, it is assumed that the value was overwritten due to an overflow condition and either the process terminates or a developer-specified handler executes. A function pointer for this handler is stored in a global variable. Some overflow conditions may allow for arbitrary addresses to be overwritten. If such a condition exists, an attacker can overwrite the handler variable with a pointer to shellcode. If this is accomplished, the protection mechanism can be circumvented and the shellcode will be executed...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息