On Wed, 24 May 2017 13:22:23 -0400, Jim Mulder wrote:

>  That is not the way the Initiator works.  The Initiator is not 
>APF-authorized.
> 
I'll assume Initiator uses an SVC or PC to launch the program with
suitable APF-authority (in a separate address space?) similar to what
fork() and BPX1EXM do.  What component performs the allocations,
since those don't cross address spaces?

>  When you ATTACH an authorized program and pass it a parm that is longer
>than 100 bytes, how do you prevent a buffer overflow security exposure if  the
>authorized program you are ATTACHing copies the parm to a 100 byte buffer
>(which it assumes is a safe thing to do, because the system documentation 
>stated
>that the maximum PARM= length was 100 bytes)? 
> 
Moribund horse.  The LONGPARM option was provided to control this.
But does ATTACH verify LONGPARM?  If not, the calling program should.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to