Statements (21)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cyberattack technique
exploit |
gptkbp:canBeBypassedBy |
non-executable stack protections
|
gptkbp:category |
software vulnerability exploitation
|
gptkbp:commonIn |
execve()
exit() system() |
gptkbp:executedBy |
functions in libc
|
gptkbp:firstDescribed |
1997
|
https://www.w3.org/2000/01/rdf-schema#label |
return-to-libc attacks
|
gptkbp:mitigatedBy |
gptkb:ASLR_(Address_Space_Layout_Randomization)
gptkb:DEP_(Data_Execution_Prevention) |
gptkbp:relatedTo |
gptkb:ROP_(Return-Oriented_Programming)
stack smashing code reuse attacks |
gptkbp:requires |
knowledge of memory addresses
|
gptkbp:target |
buffer overflow vulnerabilities
|
gptkbp:uses |
existing code in system libraries
|
gptkbp:bfsParent |
gptkb:ASLR
gptkb:ASLR_(Address_Space_Layout_Randomization) |
gptkbp:bfsLayer |
7
|