Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- neofutur@xena ~ $ paxtest kiddie
- PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@adamantix.org>
- Released under the GNU Public Licence version 2 or later
- Writing output to paxtest.log
- It may take a while for the tests to complete
- Test results:
- PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@adamantix.org>
- Released under the GNU Public Licence version 2 or later
- Mode: kiddie
- Linux xena.ww7.be 2.6.28-hardened-r9dedibox_ww7_r3 #1 Fri Dec 18 06:13:56 CET 2009 i686 VIA Esther processor 2000MHz CentaurHauls GNU/Linux
- Executable anonymous mapping : Killed
- Executable bss : Killed
- Executable data : Killed
- Executable heap : Killed
- Executable stack : Killed
- Executable anonymous mapping (mprotect) : Killed
- Executable bss (mprotect) : Killed
- Executable data (mprotect) : Killed
- Executable heap (mprotect) : Killed
- Executable stack (mprotect) : Killed
- Executable shared library bss (mprotect) : Killed
- Executable shared library data (mprotect): Killed
- Writable text segments : Killed
- Anonymous mapping randomisation test : 17 bits (guessed)
- Heap randomisation test (ET_EXEC) : 23 bits (guessed)
- Heap randomisation test (ET_DYN) : 23 bits (guessed)
- Main executable randomisation (ET_EXEC) : 15 bits (guessed)
- Main executable randomisation (ET_DYN) : 15 bits (guessed)
- Shared library randomisation test : 17 bits (guessed)
- Stack randomisation test (SEGMEXEC) : 23 bits (guessed)
- Stack randomisation test (PAGEEXEC) : 24 bits (guessed)
- Return to function (strcpy) : *** buffer overflow detected ***: rettofunc1 - terminated
- rettofunc1: buffer overflow attack in function <unknown> - terminated
- Report to http://bugs.gentoo.org/
- Killed
- Return to function (memcpy) : *** buffer overflow detected ***: rettofunc2 - terminated
- rettofunc2: buffer overflow attack in function <unknown> - terminated
- Report to http://bugs.gentoo.org/
- Killed
- Return to function (strcpy, RANDEXEC) : *** buffer overflow detected ***: rettofunc1x - terminated
- rettofunc1x: buffer overflow attack in function <unknown> - terminated
- Report to http://bugs.gentoo.org/
- Killed
- Return to function (memcpy, RANDEXEC) : *** buffer overflow detected ***: rettofunc2x - terminated
- rettofunc2x: buffer overflow attack in function <unknown> - terminated
- Report to http://bugs.gentoo.org/
- Killed
- Executable shared library bss : Killed
- Executable shared library data : Killed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement