Stefan Arentz <sare...@mozilla.com> writes: > I don’t know if this is a common technique that is used in the wild.
This is a particular example of a technique that is used in the wild. It is a consequence of Postel's Law. I call it a "Postel Bug". Software that accepts "out-of-spec" inputs in order to interoperate necessarily does so on an ad hoc basis. So, two different implementations can treat malformed inputs differently. This is exactly what is happening with the malware detection software and your software. I've written up some other examples here: http://trevorjim.com/postels-law-and-network-security/ http://trevorjim.com/postels-law-and-security-again/ http://trevorjim.com/postels-law-is-not-for-you/ -Trevor _______________________________________________ dev-security mailing list dev-security@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security