On Sun, Jan 23, 2005 at 10:41:13AM -0800, David Brownell wrote: > On Saturday 22 January 2005 9:43 pm, Greg KH wrote: > > On Sat, Jan 22, 2005 at 09:36:28PM +0000, Lilliput wrote: > > > Then my second question was about the USB stack integrity (no specific > > > to a linux platform) Do you think that devices could create an overflow > > > in order to take control/install a software in the computer ? > > > > Yes, this could easily happen. > > Easily? I'd have said "theoretically" ...
Well, "easily" because I know of some ways to do this, based on a number of different usb drivers :) It's been discussed before on some of the security mailing lists, so it's not an unknown issue. But yes, "theoretically" because I've never seen anyone actually do it. thanks, greg k-h ------------------------------------------------------- This SF.Net email is sponsored by: IntelliVIEW -- Interactive Reporting Tool for open source databases. Create drag-&-drop reports. Save time by over 75%! Publish reports on the web. Export to DOC, XLS, RTF, etc. Download a FREE copy at http://www.intelliview.com/go/osdn_nl _______________________________________________ linux-usb-devel@lists.sourceforge.net To unsubscribe, use the last form field at: https://lists.sourceforge.net/lists/listinfo/linux-usb-devel