StackDefender is an IPS (Intrusion Prevention System), for WIN32, which will deny shellcodes from executing
in User Stack and Writable memory regions. StackDefender uses PAX technology for this purpose.
StackDefender will protect your windows server from successful exploitation of buffer overflows, 0-days, worms...
From version 3.30, we are proud to announce a specific feature for Servers. This new feature of StackDefender will transparently protect
user defined programs and not only the default services. For example, you may want to protect default services + Apache program.
Please notice this feature is only available on purchased licenses. Notice that StackDefender by default protects the default
Win32 services installed unless they are added in the exclusion list.
Buffer Overflows are very common and difficult to avoid in closed source programs. The only chance for end users to
protect these programs was to trust the programmers skills.
Since generally careless programming causes the buffer overflow vulnerability, in past, computers system users and
home computers owners could just apply patches as soon as they could in order to resolve buffer overflows.
Users were sentenced to permanently be update and carry along with the responsibility to fix each and every vulnerability.
Even if you did so, installing any patch may cause another vulnerability, so
how can you just trust by having a patching policy?
From now on, with StackDefender you have the solution. With its unique technology,
StackDefender will transparently protect your windows server,
preventing buffer overflow, format string bugs, etc... exploitation.
StackDefender is the only program that can secure your system even against return into libc exploitation techniques.
StackDefender prevents and protects all the Microsoft security vulnerabilities from executing in User Stack and
Writable memory regions even if the Microsoft patch is not installed and even before Microsoft is aware of the
|Sample list of stopped worms/overflows:
- Sasser worm exploiting MS workstation service.
- Slammer worm exploiting an MS SQL overflow.
- CodeRed worm exploiting an IIS overflow.
- MS-Blaster exploiting RPC-DCOM overflow.
- IIS WebDav buffer overflow.
- MS SQL multiple buffer overflows.
- SunONE heap overflow.
- Microsoft RPC-DCOM multiple buffer overflows.
Currently StackDefender is available for:
|Additional Program (*)
|StackDefender site license
VAT not included for EU customers.
(*) Each additional program securized.
(**) Contact us for conditions.