Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New Windows Buffer Overflow!
CERT ^ | Mar 17th | Me

Posted on 03/17/2003 11:42:53 AM PST by taxcontrol

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 last
To: Bush2000
If it was really known since 1971...why haven't computer science courses in colleges across the fruited plain (and elsewhere) taught people how to write good, tight, overflow-resistant code? Because it's practically impossible using C/C++:

What's so difficult? Make pointers eight bytes, with the first word pointing to the base of the memory object and the second word being an offset. To be sure, the performance penalty would have been severe in 1971 or even 1991, but with well-designed code running on today's superscalar architectures the penalty today should be minor compared with all the other junk computers waste cycles on.

BTW, it'd be nice if someone came up with a slight extension of the x86 segment architecture to allow hardware assistance to mitigate these problems. For programs which need less than 32,000 memory chunks, the 386's six-bit pointers could provide this level of protection at the hardware level. A slight extension to allow 32-bit segment descriptors would allow segmentation to be incorporated into OS's language compilers as a general feature.

41 posted on 03/17/2003 7:37:19 PM PST by supercat (TAG--you're it!)
[ Post Reply | Private Reply | To 26 | View Replies]

To: brucew
Rediculous! Let me guess, you recomment Visual Basic??

First, it's spelled "ridiculous". And second, I didn't recommend against using C/C++. I use both on a daily basis. But that doesn't mean that the language isn't inherently vulnerable to these kinds of issues. Flexibility = greater odds of screwup.
42 posted on 03/17/2003 7:45:55 PM PST by Bush2000
[ Post Reply | Private Reply | To 37 | View Replies]

To: supercat; Bush2000
I guess what I was trying to get at is that when I was learning how to program, none of the course material I took mentioned the buffer overflow issue.

When I was a young Marine recruit, I was taught how to handle a rifle safely. I learned the art of safe small arms handling in excruciating detail LONG (no, that's not a variable type :o) before I ever learned how to actually shoot the damn thing--and the safety aspects were reinforced throughout my time in boot camp.

Yes, you still get a some NDs (negligent discharges) every year. But you get a lot less than you otherwise would with that many youngsters handling that many weapons.

It seems to me that something analogous might be needed in computer programming courses.

43 posted on 03/17/2003 7:46:07 PM PST by Poohbah (Beware the fury of a patient man -- John Dryden)
[ Post Reply | Private Reply | To 41 | View Replies]

To: ShadowAce
OK. So one even one comment is too much? I'll remember that. Of course, you DO realize, then, that you have broken your own rule by the flood of attacks?

I have no such rule.
44 posted on 03/17/2003 7:47:00 PM PST by Bush2000
[ Post Reply | Private Reply | To 38 | View Replies]

To: taxcontrol
THIS IS VEY VEY SERIES!!!! THIS IS HUGH!
45 posted on 03/17/2003 7:47:34 PM PST by buckster
[ Post Reply | Private Reply | To 1 | View Replies]

To: newgeezer; Doctor Stochastic; Bush2000; chilepepper
Generally the gory details of such things as embalming, food preparation and software development are best left uncovered.
46 posted on 03/17/2003 7:54:32 PM PST by 6ppc
[ Post Reply | Private Reply | To 18 | View Replies]

To: 6ppc
covered=hidden
47 posted on 03/17/2003 7:55:32 PM PST by 6ppc
[ Post Reply | Private Reply | To 46 | View Replies]

Comment #48 Removed by Moderator

To: Poohbah
.. when I was learning how to program, none of the course material I took mentioned the buffer overflow issue.

When I learned assembler it was a pretty hot topic... likely because it was so easy to prevent and/or correct in assembler.

But using (cough) high-level languages puts you at the mercy of the code generator in the compiler. It's scary to realize how much vulnerability can be introduced into executables by processes that the programmer has no control over.

49 posted on 03/18/2003 7:20:08 AM PST by TechJunkYard (via Cherie)
[ Post Reply | Private Reply | To 43 | View Replies]

To: TechJunkYard
When I learned assembler it was a pretty hot topic... likely because it was so easy to prevent and/or correct in assembler.

To pick a small nit, you learned assembly language. You used an assembler tool to produce object code. People use these terms interchangeably -- but there is a technical difference.
50 posted on 03/18/2003 10:41:16 AM PST by Bush2000
[ Post Reply | Private Reply | To 49 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson