Remember that in order to exploit these, you need to be able to load and run 
your own code next to the code you're trying to attack.  You generally can't do 
that in embedded devices like printers, routers, POS terminals, etc.  Also, 
these are attacks that apply to systems running multiple processes that are 
protected from each other using hardware features - but a lot of embedded 
devices only run one process, or run with a model that already lets everything 
access all memory and resources - since you don't expect people to be adding 
malicious code to your embedded device.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to