* Nick FitzGerald:

> You -- and all journalistic and other commentaries I've seen/heard on 
> the increasingly common use of these targetted Office exploits -- miss 
> one very important option, I think; the attacker has access to 
> (partial) source of the closed, supposedly closely-held, proprietary 
> software in question.

<http://www.microsoft.com/presspass/press/2004/sep04/09-19OfficeGSPPR.mspx>

I would expect that various universities have got access to the source
code as well, and several companies.

The times when you couldn't get source code for proprietary,
off-the-shelf software are over.  Welcome to the new world order! 8-)
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to