Compromised Stack Procedure B Stack Procedure a P3 call c P2 call B PI Prog ctr Stack ptr Procedure c de code Prog ctr Stack Ptr From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
Compromised Stack 11 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
12 Overwriting Memory for EXecution Overwrite the program counter stored in the stack Overwrite part of the code in low memory, substituting new instructions Overwrite the program counter and data in the stack so that the program counter points to the stack From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Overwriting Memory for Execution •Overwrite the program counter stored in the stack •Overwrite part of the code in low memory, substituting new instructions •Overwrite the program counter and data in the stack so that the program counter points to the stack 12 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved