[Info-vax] Whither VMS?

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Fri Oct 2 12:53:44 EDT 2009


In article <4895ah.i6n.ln at gw1>, Jordi Guillaumes i Pons <send.me at no.spam> writes:
>En/na Bob Eager ha escrit:
>>>interesting, since in architectures like x86 that can overwrite the
>>>stack frame
>> 
>> 
>> As you can in the VAX...
>
>Specially if you program in C and "think" in C. If you follow the rules 
>(VAX Calling and Conditio Handling IIRC) you should use descriptors to 
>pass strings. And your routine _should_ check if the lenght of the 
>string passed as parameter fits in your buffer.
>
>C is a good language for systems programming. I've always thought of it 
>as an assembly language on steroids. For a systems programmer pointers 
>are part of his daily life. But those things have no place in a payroll 
>program. And, for the sake of the security, neither in a web server.

Macro is an assembly language on steroids.  Bliss is an assembly language
on steroids.  C needs Altoids, not steroids, because it stinks.  It doesn't
even have a decent macro capability.


>>>Of course, that could'nt happen in a VAX. All you would get is a ACCVIO,
>>>since VAX has a exec bit for each page, and the stack should not be exec
>>>utable. But on the x86 they have that kind of protection only recently.
>> 
>> 
>> The exec bit won't save the stack frame. It'll stop part of the stack 
>> being executed as code, and it'll stop a corrupted return link diving 
>> into non-code, but it won't stop a corrupted return link diving into a 
>> different bit of code.
>
>
>Yep, but if the stack itself is not executable the bad guy will have 
>more difficulties to do nasty things. First of all, he (or she) will not 
>be able of putting a snippet of code in the stack. Yes, he could 
>redirect the program to do nasty things... but not WHATEVER nasty thing.
>
>Oh, by the way, I don't have if this has REALLY happened. Do you nou 
>about any succesful attack against a VAX running VMS using a 
>buffer/stack overflow?

Yes.  About a year ago there was much discussion here with respect to one 
of the RTL routines employed  in many of the system utilities for command
line input and recall.  I still have a simple 20 Alpha instruction "hack"
to demonstrate the exploit dated 17-Aug-2008.  I think if you go back and
google this news group for article around that time frame with DEFCON in
them, you should be able to find some info.  HP issued a patch for this
vulnerability.  Hopefully, sites installed it.


-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

  http://www.quirkfactory.com/popart/asskey/eqn2.png
  
  "Well my son, life is like a beanstalk, isn't it?"



More information about the Info-vax mailing list