‘Smack the Stack – Advanced Buffer Overflow Methods (Virtual Address)’
Causes certain parts of a process virtual address space to be different for each invocation of the process. The purpose of this is to raise the bar on buffer overflow exploits. As full randomization makes it not possible to use absolute addresses in the exploit. Randomizing the stack pointer and mmap() addresses. Which also effects where shared libraries goes, among other things. The stack is randomized within an 8Mb range and applies to ELF binaries. The patch intedned to be an addition to the NX support that was added to the 2.6 kernel earlier as well. This paper however addressed it as solo.
The full paper can be downloaded from: http://www.tty64.org/doc/smackthestack.txt‘