On 8/3/17, 8:27 AM, "sqlite-users on behalf of Ulrich Telle" 
<sqlite-users-boun...@mailinglists.sqlite.org on behalf of ulrich.te...@gmx.de> 
wrote:
> I really don't think that the latter is true. To overcome the restriction is 
> extremly simple, if you don't care about memory leaks. Just do [...]

If you’re creating a malicious extension, sure. But if you’re creating an 
exploit this seems like an odd way to go about it. It’d be simpler to implement 
something like “SELECT root_shell_on_port(1337);”

_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to