lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: avalon at caligula.anu.edu.au (Darren Reed) Subject: And how long have buffer overflows been aro Maybe they're referring to Windows NT having a heritage of core design from people who worked on VMS (which does predate the Internet.) In some mail from "Ng, Kenneth (US)", sie said: > > What quantum universe is this guy coming from? I don't know the start of > the internet, but the date on the telnet RFC 318 is April 3, 1972 ( > http://www.faqs.org/rfcs/rfc318.html ) According to Microsoft's own time > line ( http://www.microsoft.com/windows/WinHistoryProGraphic.mspx ) Windows > NT started in 1993. Maybe they consider the start of the internet in Al > Gore terms? > > -----Original Message----- > From: full-disclosure-admin@...ts.netsys.com > [mailto:full-disclosure-admin@...ts.netsys.com]On Behalf Of Edward W. > Ray > Sent: Thursday, February 26, 2004 7:51 PM > To: full-disclosure@...ts.netsys.com > Subject: [Full-Disclosure] And how long have buffer overflows been > around? > > > A lot longer than just before Windows 2003 release, but not according to > Security Architect and Chief Technology Officer of Microsoft's Security > Business Unit David Aucsmith: > > > "Windows 95 was written without a single security feature, he said, as it > was designed to be totally open to let users connect to other systems. > Furthermore, the security kernel of the Windows NT server software was > written before the Internet, and the Windows Server 2003 software was > written before buffer overflows became a frequent target of recent > attacks..." > > > The rest of the article can be found at > http://www.infoworld.com/article/04/02/24/HNunderattack_1.html > > > A little levity for today's discussion. > > Edward W. Ray > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > > > ***************************************************************************** > The information in this email is confidential and may be legally privileged. > It is intended solely for the addressee. Access to this email by anyone else > is unauthorized. > > If you are not the intended recipient, any disclosure, copying, distribution > or any action taken or omitted to be taken in reliance on it, is prohibited > and may be unlawful. When addressed to our clients any opinions or advice > contained in this email are subject to the terms and conditions expressed in > the governing KPMG client engagement letter. > ***************************************************************************** > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html >
Powered by blists - more mailing lists