Top > Network Applications > Security > GMM
The GMM library uses dynamic function call interception to catch
the most common functions that attackers use to exploit stack
buffers. It uses the LD_PRELOAD capability and offers two services:
first, it avoids buffer overflow to allow the attacker to execute
shell-code on your machine. Second, where an exploit is detected, it
saves the stack content and triggers a segmentation fault. The
resulting core dump has the necessary information to debug the exploit
and fix the software.
Obtaining
|
|
User reference in PDF from http://www.xmailserver.org/gmm.pdfSupport contacts
Maintainers |
|
Developers |
|
Interfaces | library |
Source languages | C |
Use requirements | glibc |
Build prerequisites | gcc |
Related programs | libsafe |
License verified by | Janet Casey <jcasey@gnu.org> on 2004-01-27 |
Entry compiled by | Davide Libenzi <davidel@xmailserver.org> |
Categories
The copyright licensing notice below applies to this text. The software described in this text has its own copyright notice and license, which can usually be found in the distribution itself.
Copyright © 2000, 2001, 2002, 2003, 2004 Free Software Foundation, Inc.
Permission is granted to copy, distribute, and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of this license is included in the file COPYING.DOC.
Please report any problems in this page to bug-directory@gnu.org, or find out how you can help fix them.
The FSF provides this directory as a service to the free software community. Please consider donating to the FSF to help support this project.