Return-to-libc attack
A "return-to-libc" attack is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack is replaced by an address of a subroutine that is already present in the process executable memory, bypassing the no-execute bit feature (if present) and ridding the attacker of the need to inject their own code. The first example of this attack in the wild was contributed by Alexander Peslyak on the Bugtraq mailing list in 1997.
ASCII armor regionAddress space layout randomizationBuffer overflowBuffer overflow protectionCall stackCode reuseComparison of Windows Vista and Windows XPExecutable space protectionHacking: The Art of ExploitationIOSMemory corruptionMemory safetyMinix 3PaXPosition-independent codePrelinkRet-into-libcRet2libcRet2libc attackReturn-to-libcReturn-to-pltSecurity and safety features new to Windows VistaSolar DesignerStack buffer overflow
Link from a Wikipage to another Wikipage
seeAlso
primaryTopic
Return-to-libc attack
A "return-to-libc" attack is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack is replaced by an address of a subroutine that is already present in the process executable memory, bypassing the no-execute bit feature (if present) and ridding the attacker of the need to inject their own code. The first example of this attack in the wild was contributed by Alexander Peslyak on the Bugtraq mailing list in 1997.
has abstract
A "return-to-libc" attack is a ...... ed to execute shell commands).
@en
Link from a Wikipage to an external page
Wikipage page ID
page length (characters) of wiki page
Wikipage revision ID
1,022,278,226
Link from a Wikipage to another Wikipage
wikiPageUsesTemplate
hypernym
comment
A "return-to-libc" attack is a ...... Bugtraq mailing list in 1997.
@en
label
Return-to-libc attack
@en