summaryrefslogtreecommitdiff
path: root/src/usr.bin
diff options
context:
space:
mode:
authormiod <>2014-04-22 21:52:21 +0000
committermiod <>2014-04-22 21:52:21 +0000
commit6e952462788feb4cbe1eb9130fc742e698bb76f0 (patch)
treeda1742df8528640216f927a9907fe4e7c55bf9ec /src/usr.bin
parent71b791a2ff679463d6ef915490232cfa037f02b2 (diff)
downloadopenbsd-6e952462788feb4cbe1eb9130fc742e698bb76f0.tar.gz
openbsd-6e952462788feb4cbe1eb9130fc742e698bb76f0.tar.bz2
openbsd-6e952462788feb4cbe1eb9130fc742e698bb76f0.zip
So it turns out that libcrypto on i386 platforms, unconditionaly compiles this
little gem called OPENSSL_indirect_call(), supposedly to be ``handy under Win32''. In my view, this is a free-win ROP entry point. Why try and return to libc when you can return to libcrypto with an easy to use interface? Better not give that much attack surface, and remove this undocumented entry point. ok beck@ tedu@
Diffstat (limited to 'src/usr.bin')
0 files changed, 0 insertions, 0 deletions