[VIM] On classifying attacks (fwd)
Steven M. Christey
coley at linus.mitre.org
Fri Jul 15 15:07:07 EDT 2005
Interesting.
I *just* answered an e-mail from someone who asked why a vulnerability in
an image processor was "remote" when he didn't process images by using
networks.
I think this example stretches the "Trojan horse" concept slightly, but
it's definitely thinking in the right direction.
But what would the adjective version of "remote attacker" and "local user"
be in a Trojaned context?
- Steve
More information about the VIM
mailing list