On Sun, Jan 23, 2005 at 10:41:13AM -0800, David Brownell wrote:
> On Saturday 22 January 2005 9:43 pm, Greg KH wrote:
> > On Sat, Jan 22, 2005 at 09:36:28PM +0000, Lilliput wrote:
> > > Then my second question was about the USB stack integrity (no specific
> > > to a linux platform) Do you think that devices could create an overflow
> > > in order to take control/install a software in the computer ? 
> > 
> > Yes, this could easily happen.
> 
> Easily?  I'd have said "theoretically" ... 

Well, "easily" because I know of some ways to do this, based on a number
of different usb drivers :)  It's been discussed before on some of the
security mailing lists, so it's not an unknown issue.

But yes, "theoretically" because I've never seen anyone actually do it.

thanks,

greg k-h


-------------------------------------------------------
This SF.Net email is sponsored by: IntelliVIEW -- Interactive Reporting
Tool for open source databases. Create drag-&-drop reports. Save time
by over 75%! Publish reports on the web. Export to DOC, XLS, RTF, etc.
Download a FREE copy at http://www.intelliview.com/go/osdn_nl
_______________________________________________
linux-usb-devel@lists.sourceforge.net
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-devel

Reply via email to