| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Most Unsecure OS? Yep, It`s Linux |
From: "Geo."
I'm still not clear, is an API the same thing as printf() would be
considered? Is an API a library function that is part of the language or
just a published entry point for whatever DLL you happen to write?
IOW, I could create a DLL file with an entry point called Geo, but there is
no geo() function in C++ so this would not count as something you would
search thru all source code looking for occurances.
Geo.
"Tony Williams" wrote in message
news:3dea5279$1{at}w3.nls.net...
> I take a public API to mean any entry point to a library function
> (static, shared, DLL or kernel call) which can be used directly by a
> third party program. I think that's a pretty standard definition.
>
> A private subroutine in a program could be vulnerable in its own right
> or because it uses a public function which has a weakness. By the same
> token, several API functions could be vulnerable because they also use
> the same exploitable API function. That includes third-party DLLs (say)
> which use the API in their own published API.
>
> There are also undocumented API calls which, although accessible to
> third-party programs, aren't officially supported. There was a flap at
> one time about Microsoft using these to give its own apps an unfair
> advantage, but that's a different thread.
>
> --
> Tony
>
> Geo. wrote:
> > Ok I understand somewhat but is a public API the same thing as printf()
or
> > is it more like a subroutine in a program where printf() would be part
of
> > that subroutine?
> >
> > Geo.
> >
> > "Tony Williams" wrote in message
> > news:3de94098{at}w3.nls.net...
> >
> >>We don't seem to be communicating too well I'll admit. Try this. Given a
> >>known vulnerability in an app it's easy to get a stack trace of where
> >>the program is when the exploit happens. From this you can find out
> >>which, if any, public API function is being exploited. If the exploit
> >>doesn't involve a public API then it's specific to that app.
>
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 3/2 10 106/1 120/544 123/500 379/1 633/260 267 270 285 774/0 605 SEEN-BY: 2432/200 7105/1 @PATH: 379/1 106/1 123/500 774/605 633/260 285 267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.