Rick is correct - most hacking is done via buffer overflows. It's highly 
unlikely that this has ever been researched thoroughly (or at all) with 
Remedy, and given Remedy was written back in the early 90s, the chances of 
buffer overflows are very high. 

That is the case with any old application, such as sendmail. I don't know any 
good Unix admin who'd use sendmail given the choice between sendmail or 
postfix. Many of my Unix colleagues have a very dim opinion of PHP, too.

Consider IIS or IE. Despite all the money MS has thrown at those two products, 
there's still a steady stream of security issues. Even when one takes a badly 
written product and applies lots of money and development time, the security 
problems often persist.

However, I've often thought to myself, while someone on the local network 
could hack Remedy, if they have those skills then why bother? There's no 
point hacking Remedy when one could go straight to the database, or run a 
packet sniffing tool, or find an HR application to hack, or bring a corporate 
network to a standstill, etc. 


John

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the 
Answers Are"

Reply via email to