Jochem van Dieten wrote:
> Spike wrote:
> 
>>Not to mention the fact that a lot of the exploits that are discovered 
>>in open source software may well have a directly comparable exploit in 
>>closed source software if the mechanism of failure is a non-obvious one 
>>in an otherwise typical code construct.
> 
> 
> You mean like the integer overflows that made non priviledge 
> separated OpenSSH rootable a few years ago. Sure, the patch was 
> out before the exploit was out. But did anybody take a step back, 
> said "wow, this is a whole new type of overflow" and then audited 
> the entire codebase for that type of overflow?

That's exactly my point. Almost certainly nobody audited their codebase 
for either closed or open source projects, but anyone who wanted to 
craft an exploit could have easily added it to their box of tricks. If 
the exploit was discovered in a closed source project, that information 
may very well have never made it outside the confines of the project.

Spike

--
--------------------------------------------
Stephen Milligan
Code poet for hire
http://www.spike.org.uk

Do you cfeclipse? http://cfeclipse.tigris.org

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:194753
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to