security - Add stack protection removal flags to apache compilation script -


for study purposes i'd test buffer overflow exploits on old 1.3.x version of apache webserver. anyway have stack protection on, doesn't work or @ least think doesn't reason. in order disable protections have compile these flags:

-fno-stack-protector -z execstack 

but don't know how add them apache compilation process..i never did this! can me?

try:

cflags="-fno-stack-protector" ldflags="-z execstack" ./configure [...] 

cflags compiler, execstack linker option, should go in ldflags. or, if supported can compiler pass linker options -with -wl, so:

cflags="-fno-stack-protector -wl,-z,execstack" ./configure [...]  

see install file in apache source archive more details.

it's useful inspect or compare generated top-level makefile, should see parameters in either or both of extra_cflags , extra_ldflags.

given task have, if you're running linux distribution has periodic pre-linking , aslr task, should check install apache path not processed, otherwise testing might complicated when apache binary "fixed" 1 night...

check if prelink installed with

 dpkg -l prelink      # ubuntu/debian derived  rpm -qv prelink      # centos/red hat derived 

and check configuration (usually) in /etc/prelink.conf , 1 of: /etc/defaults/prelink or /etc/sysconfig/prelink .

on ubuntu (but not on centos/rh) directories under /usr/local/ (bin, sbin, lib) are included processing. if install apache default /usr/local/apache should untouched, or if want thorough can add directory blacklist (-b) line /etc/prelink.conf


Comments

Popular posts from this blog

ruby - Trying to change last to "x"s to 23 -

jquery - Clone last and append item to closest class -

c - Unrecognised emulation mode: elf_i386 on MinGW32 -