Statements (21)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cyberattack_technique
gptkb:exploit |
| gptkbp:canBeBypassedBy |
non-executable stack protections
|
| gptkbp:category |
software vulnerability exploitation
|
| gptkbp:commonIn |
execve()
exit() system() |
| gptkbp:executedBy |
functions in libc
|
| gptkbp:firstDescribed |
1997
|
| gptkbp:mitigatedBy |
gptkb:ASLR_(Address_Space_Layout_Randomization)
gptkb:DEP_(Data_Execution_Prevention) |
| gptkbp:relatedTo |
gptkb:ROP_(Return-Oriented_Programming)
stack smashing code reuse attacks |
| gptkbp:requires |
knowledge of memory addresses
|
| gptkbp:target |
buffer overflow vulnerabilities
|
| gptkbp:uses |
existing code in system libraries
|
| gptkbp:bfsParent |
gptkb:ASLR
gptkb:ASLR_(Address_Space_Layout_Randomization) |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
return-to-libc attacks
|