Buffer Overrun Protection in SP2?

  • Thread starter Thread starter RJ
  • Start date Start date
R

RJ

One of the security features touted in XP SP2 is the prevention
of buffer overruns or buffer overflows. Applications and operating systems can store commands
in short-term memory, called buffer memory, and through poor programming
or hacking, that buffer memory can be overwritten by other code. This provides a way for hackers
to crash a computer, cause it to lock up, allow malevolent code to be executed, and so on.

SP2 is supposed to prevent buffer overruns. However, as reported on ZDNet, this needed addition
to Windows XP (hardware enforced DEP) will only work on a handful of PCs (comparitively) using
certain
processors (for now).
MS has done the right thing by adding this protection to XP, but maybe it won't do you any good.
See the link below for more info.

http://blogs.zdnet.com/index.php?p=283
 
RJ said:
SP2 is supposed to prevent buffer overruns. However, as reported on ZDNet, this needed addition
to Windows XP (hardware enforced DEP) will only work on a handful of PCs (comparitively) using
certain
processors (for now).

Those are quite different things. DEP is the ultimate solution by
keeping data and programs quite separate, but a great deal of work has
gone into preventing overruns happening without DEP being present. Also
SP2 includes a software DEP for hardware that does not have it
 
Back
Top