(Renew Stack Smashing Protector)
Prevent SSP Brute Force Attacks
Do not be left behind in the race of security, particularly in network applications that are exposed to the wild.
Current network server architectures (forking and pre-forking), used by most servers like Apache, Samba, Lighttpd, etc., are prone to brute force attacks against the Stack Smashing Protector.
The forking server architecture is not limited to networking servers, but it is also widely used in desktop applications (Firefox, Chrome, etc.) and applications launchers as Android's Zygote.
If the vulnerability can be exploited using the byte-for-byte attack then, a system without RenewSSP can be defeated in just a few seconds. Using RenewSSP, it is close to impossible.
Among others, RenewSSP thwarts:
Note that RenewSSP was prior to these kind of attacks.
This and other developments has been donde by the Cybersecurity Research group at Universitat Politecnica de Valencia.
To get in touch with us, please, visit the CyberSecurity UPV contact page.