[Info-vax] Android development Was Re: OT: Larry Ellison takes retirement as CEO of Oracle

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Sun Sep 21 11:26:39 EDT 2014


On 2014-09-21, Johnny Billquist <bqt at softjar.se> wrote:
>
> Malware will not be able to do much unless they actually do some system 
> calls... They can of course corrupt their own memory if they want to. 
> Not that any other process would care...
>

$ set response/mode=good_natured

Boy, you lot are really disappointing me today with your lack of
imagination. :-)

All you need to do to get that x86 code executing is to have the right
kind of buffer overflow in kernel mode.

As VMS is a monolithic kernel, all the peripheral address space is
mapped in while in kernel mode so your malware doesn't need to know
VMS internals in order to trash your hardware.

As for the initial point of entry for the exploit itself, what if some
common mode vulnerability is found in (say) a TCP/IP component which
lives in kernel mode ?

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Microsoft: Bringing you 1980s technology to a 21st century world



More information about the Info-vax mailing list