Advertisement
neofutur

good paxtest

Jun 2nd, 2011
233
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.62 KB | None | 0 0
  1. neofutur@xena ~ $ paxtest kiddie
  2. PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@adamantix.org>
  3. Released under the GNU Public Licence version 2 or later
  4.  
  5. Writing output to paxtest.log
  6. It may take a while for the tests to complete
  7. Test results:
  8. PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@adamantix.org>
  9. Released under the GNU Public Licence version 2 or later
  10.  
  11. Mode: kiddie
  12. Linux xena.ww7.be 2.6.28-hardened-r9dedibox_ww7_r3 #1 Fri Dec 18 06:13:56 CET 2009 i686 VIA Esther processor 2000MHz CentaurHauls GNU/Linux
  13.  
  14. Executable anonymous mapping : Killed
  15. Executable bss : Killed
  16. Executable data : Killed
  17. Executable heap : Killed
  18. Executable stack : Killed
  19. Executable anonymous mapping (mprotect) : Killed
  20. Executable bss (mprotect) : Killed
  21. Executable data (mprotect) : Killed
  22. Executable heap (mprotect) : Killed
  23. Executable stack (mprotect) : Killed
  24. Executable shared library bss (mprotect) : Killed
  25. Executable shared library data (mprotect): Killed
  26. Writable text segments : Killed
  27. Anonymous mapping randomisation test : 17 bits (guessed)
  28. Heap randomisation test (ET_EXEC) : 23 bits (guessed)
  29. Heap randomisation test (ET_DYN) : 23 bits (guessed)
  30. Main executable randomisation (ET_EXEC) : 15 bits (guessed)
  31. Main executable randomisation (ET_DYN) : 15 bits (guessed)
  32. Shared library randomisation test : 17 bits (guessed)
  33. Stack randomisation test (SEGMEXEC) : 23 bits (guessed)
  34. Stack randomisation test (PAGEEXEC) : 24 bits (guessed)
  35. Return to function (strcpy) : *** buffer overflow detected ***: rettofunc1 - terminated
  36. rettofunc1: buffer overflow attack in function <unknown> - terminated
  37. Report to http://bugs.gentoo.org/
  38. Killed
  39. Return to function (memcpy) : *** buffer overflow detected ***: rettofunc2 - terminated
  40. rettofunc2: buffer overflow attack in function <unknown> - terminated
  41. Report to http://bugs.gentoo.org/
  42. Killed
  43. Return to function (strcpy, RANDEXEC) : *** buffer overflow detected ***: rettofunc1x - terminated
  44. rettofunc1x: buffer overflow attack in function <unknown> - terminated
  45. Report to http://bugs.gentoo.org/
  46. Killed
  47. Return to function (memcpy, RANDEXEC) : *** buffer overflow detected ***: rettofunc2x - terminated
  48. rettofunc2x: buffer overflow attack in function <unknown> - terminated
  49. Report to http://bugs.gentoo.org/
  50. Killed
  51. Executable shared library bss : Killed
  52. Executable shared library data : Killed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement