TIP: Click on subject to list as thread! ANSI
echo: linuxhelp
to: Geo.
from: Tony Williams
date: 2002-11-30 14:56:02
subject: Re: Most Unsecure OS? Yep, It`s Linux

From: Tony Williams 

We don't seem to be communicating too well I'll admit. Try this. Given a
known vulnerability in an app it's easy to get a stack trace of where the
program is when the exploit happens. From this you can find out which, if
any, public API function is being exploited. If the exploit doesn't involve
a public API then it's specific to that app.

--
Tony

Geo. wrote:
> What public API function? Does that tell you that it's a specific function
> in a C++ library and make it easy to search all the source code for windows
> to see what other modules use that same library function? I think you are
> missing my whole point here.
>
> Geo.
>
> "Tony Williams"  wrote in message
> news:3de8fe76{at}w3.nls.net...
>
>>Geo. wrote:
>>
>>>"Tony Williams"  wrote in message
>>>news:3DE7AA13.9070708{at}blarg.net...
>>>
>>>
>>>
>>>>>And how would you know what function to search for?
>>>>
>>>>The one with the known vulnerability - printf() in your example.
>>>
>>>
>>>Great, so what function was it in this latest patch for the ocx control
>
> with
>
>>>MS? Oh, you don't have the source so you don't know? How about any of
>
> the MS
>
>>>patches, do you know what functions to search for?
>>>
>>
>>It wouldn't be too hard to find out from the documentation if it was a
>>public API function. All it takes is a stack trace on a program
>>exhibiting the vulnerability.
>>
>>If it wasn't one of the API functions then nobody will be using it
>>except through another documented API function so the vulnerability can
>>be exploited via that call.
>>
>>--
>>Tony
>>
>
>
>

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 3/2 10 106/1 120/544 123/500 379/1 633/260 267 270 285 774/0 605
SEEN-BY: 2432/200 7105/1
@PATH: 379/1 106/1 123/500 774/605 633/260 285 267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.