[Info-vax] DCL vulnerability write up on The Register
Richard Maher
maher_rjSPAMLESS at hotmail.com
Sun Feb 18 18:01:40 EST 2018
On 18-Feb-18 8:21 PM, Richard Maher wrote:
> On 18-Feb-18 5:13 PM, Simon Clubley wrote:
>> 3) A process space which is shared by the shell and a combination of
>> privileged and non-privileged programs. This gives various attack
>> possibilites which do not exist on Unix. When combined with data
>> structures which are executable, this makes it easier to exploit any
>> vulnerabilities found in programs and the shell.
>>
>
> I do not see protected memory in a single process space as an intrinsic
> problem/vulnerability but I'm willing to be enlightened.
>
Still don't see the intrinsic architectural vulnerability with shared
address space across processor modes even with the subsequent
illuminating replies. Just piss-poor implementation.
More information about the Info-vax
mailing list