SSH buffer management problem

Tim Seufert yellowdog-general@lists.terrasoftsolutions.com
Tue Sep 16 22:01:01 2003


On Tuesday, September 16, 2003, at 10:40  AM, Konstantin Riabitsev 
wrote:

> Well, it should also be noted that YDL is a little less vulnerable to
> skript kiddi3 attacks, as memory buffer allocations are completely
> different on PPC than on x86.

That's not really the way to put it.  The security weaknesses are 
typically exactly the same, because (as a general rule) the same source 
code is used for all processor architectures, and weaknesses such as 
buffer overflows are almost always mistakes made at the source code 
level.

What's different about PPC is that naturally one must smash an 
overflowed buffer with PPC binary code rather than x86.  The root kits 
usually only include x86 binaries, so PPC boxes tend to be somewhat 
safer from random script kiddie attacks.  (But clueless script kiddies 
trying to attack a PPC box with an x86 rootkit may still cause pain by 
crashing attackable processes during attempts to get a root shell etc.)