dwww Home | Show directory contents | Find package


This is what it paxtest looks like if you run it on a Debian GNU/Linux kernel
without the Grsecurity patch protections:

----------------------------------------------------------------------

PaXtest - Copyright(c) 2003,2004 by Peter Busser <[EMAIL PROTECTED]>
Released under the GNU Public Licence version 2 or later

Mode: Blackhat
Linux xxxxxxxx 3.10-3-686-pae #1 SMP Debian 3.10.11-1 (2013-09-10) i686 GNU/Linux

Executable anonymous mapping             : Killed
Executable bss                           : Killed
Executable data                          : Killed
Executable heap                          : Killed
Executable stack                         : Killed
Executable shared library bss            : Killed
Executable shared library data           : Killed
Executable anonymous mapping (mprotect)  : Vulnerable
Executable bss (mprotect)                : Vulnerable
Executable data (mprotect)               : Vulnerable
Executable heap (mprotect)               : Vulnerable
Executable stack (mprotect)              : Vulnerable
Executable shared library bss (mprotect) : Vulnerable
Executable shared library data (mprotect): Vulnerable
Writable text segments                   : Vulnerable
Anonymous mapping randomisation test     : 9 bits (guessed)
Heap randomisation test (ET_EXEC)        : 14 bits (guessed)
Heap randomisation test (PIE)            : 16 bits (guessed)
Main executable randomisation (ET_EXEC)  : 10 bits (guessed)
Main executable randomisation (PIE)      : 10 bits (guessed)
Shared library randomisation test        : 10 bits (guessed)
Stack randomisation test (SEGMEXEC)      : 19 bits (guessed)
Stack randomisation test (PAGEEXEC)      : 19 bits (guessed)
Arg/env randomisation test (SEGMEXEC)    : 11 bits (guessed)
Arg/env randomisation test (PAGEEXEC)    : 11 bits (guessed)
Randomization under memory exhaustion @~0: No randomisation
Randomization under memory exhaustion @0 : No randomisation
Return to function (strcpy)              : Vulnerable
Return to function (memcpy)              : Killed
Return to function (strcpy, PIE)         : Vulnerable
Return to function (memcpy, PIE)         : Killed

Generated by dwww version 1.15 on Mon Jun 24 13:46:00 CEST 2024.