| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Most Unsecure OS? Yep, It`s Linux |
From: Tony Williams
I take a public API to mean any entry point to a library function (static,
shared, DLL or kernel call) which can be used directly by a third party
program. I think that's a pretty standard definition.
A private subroutine in a program could be vulnerable in its own right or
because it uses a public function which has a weakness. By the same token,
several API functions could be vulnerable because they also use the same
exploitable API function. That includes third-party DLLs (say) which use
the API in their own published API.
There are also undocumented API calls which, although accessible to
third-party programs, aren't officially supported. There was a flap at one
time about Microsoft using these to give its own apps an unfair advantage,
but that's a different thread.
--
Tony
Geo. wrote:
> Ok I understand somewhat but is a public API the same thing as printf() or
> is it more like a subroutine in a program where printf() would be part of
> that subroutine?
>
> Geo.
>
> "Tony Williams" wrote in message
> news:3de94098{at}w3.nls.net...
>
>>We don't seem to be communicating too well I'll admit. Try this. Given a
>>known vulnerability in an app it's easy to get a stack trace of where
>>the program is when the exploit happens. From this you can find out
>>which, if any, public API function is being exploited. If the exploit
>>doesn't involve a public API then it's specific to that app.
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 3/2 10 106/1 120/544 123/500 379/1 633/260 267 270 285 774/0 605 SEEN-BY: 2432/200 7105/1 @PATH: 379/1 106/1 123/500 774/605 633/260 285 267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.