09.01.2018 12:36, Mark Rotteveel wrote:
it can be exploited by any code running local on your machine. So anything on that machine that could have a remote code execution vulnerability, or just a plain malicious update, could then exploit it.

Anything that can have such vulnerability don't need tricky meltdown techniques to exploit database on local drive.


--
  WBR, SD.

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to