[Info-vax] DCL vulnerability write up on The Register

Richard Maher maher_rjSPAMLESS at hotmail.com
Sun Feb 18 18:01:40 EST 2018


On 18-Feb-18 8:21 PM, Richard Maher wrote:
> On 18-Feb-18 5:13 PM, Simon Clubley wrote:
>> 3) A process space which is shared by the shell and a combination of
>> privileged and non-privileged programs. This gives various attack
>> possibilites which do not exist on Unix. When combined with data
>> structures which are executable, this makes it easier to exploit any
>> vulnerabilities found in programs and the shell.
>>
> 
> I do not see protected memory in a single process space as an intrinsic 
> problem/vulnerability but I'm willing to be enlightened.
> 

Still don't see the intrinsic architectural vulnerability with shared 
address space across processor modes even with the subsequent 
illuminating replies. Just piss-poor implementation.



More information about the Info-vax mailing list