Libsafe

 


Overview

libsafe

https://github.com/tagatac/libsafe-CVE-2005-1125
Detects and handles buffer overflow attacks

The exploitation of buffer overflow and format string vulnerabilities in process stacks are a significant portion of security attacks. 'libsafe' is based on a middleware software layer that intercepts all function calls made to library functions known to be vulnerable. A substitute version of the corresponding function implements the original function in a way that ensures that any buffer overflows are contained within the current stack frame, which prevents attackers from overwriting the return address and hijacking the control flow of a running program. The true benefit of using libsafe is protection against future attacks on programs not yet known to be vulnerable. The performance overhead of libsafe is negligible, it does not require changes to the OS, it works with existing binary programs, and it does not need access to the source code of defective programs, or recompilation or off-line processing of binaries.





Details

Licensing

License

Verified by

Verified on

Notes

License

LGPL

Verified by

Janet Casey

Verified on

11 July 2001




Leaders and contributors

Contact(s)Role
Maintainer


Resources and communication

AudienceResource typeURI
Debian (Ref)https://tracker.debian.org/pkg/libsafe
Developer,SupportE-mailmailto:libsafe@research.avayalabs.com


Software prerequisites

About this entry



<headertabs />








"Debian (Ref)" is not in the list (General, Help, Bug Tracking, Support, Developer) of allowed values for the "Resource audience" property.