[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Vulnerabilities in Synchronous IPC Designs
From: |
Jean-Charles Salzeber |
Subject: |
Re: Vulnerabilities in Synchronous IPC Designs |
Date: |
Mon, 2 Jun 2003 19:29:35 +0200 |
User-agent: |
Mutt/1.5.4i |
On Mon, Jun 02, 2003 at 18:21, Niels Möller wrote:
> 2. Use one server thread per user. Then any user can only DOS-attack
> his or her own processes.
The malicious code might also be put in a 'fine' process (using a buffer
overflow for example)... Having all root processes DOS-attacked because
of only one 1 bug is somewhat annoying :)
JC
- Re: Vulnerabilities in Synchronous IPC Designs, (continued)
- Re: Vulnerabilities in Synchronous IPC Designs, Andreas Haeberlen, 2003/06/03
- Re: Vulnerabilities in Synchronous IPC Designs, Marcus Brinkmann, 2003/06/03
- Re: Vulnerabilities in Synchronous IPC Designs, Niels Möller, 2003/06/03
- Re: Vulnerabilities in Synchronous IPC Designs, Espen Skoglund, 2003/06/03
- Re: Vulnerabilities in Synchronous IPC Designs, Niels Möller, 2003/06/03
- Re: Vulnerabilities in Synchronous IPC Designs, Kip Macy, 2003/06/06
- Re: Vulnerabilities in Synchronous IPC Designs, Niels Möller, 2003/06/02
- Re: Vulnerabilities in Synchronous IPC Designs, Marcus Brinkmann, 2003/06/02
- Re: Vulnerabilities in Synchronous IPC Designs,
Jean-Charles Salzeber <=
Re: Vulnerabilities in Synchronous IPC Designs, Marcus Brinkmann, 2003/06/02
RE: Vulnerabilities in Synchronous IPC Designs, Volkmar Uhlig, 2003/06/02
RE: Vulnerabilities in Synchronous IPC Designs, Volkmar Uhlig, 2003/06/02