Remember that in order to exploit these, you need to be able to load and run your own code next to the code you're trying to attack. You generally can't do that in embedded devices like printers, routers, POS terminals, etc. Also, these are attacks that apply to systems running multiple processes that are protected from each other using hardware features - but a lot of embedded devices only run one process, or run with a model that already lets everything access all memory and resources - since you don't expect people to be adding malicious code to your embedded device.
---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
