[<prev] [next>] [day] [month] [year] [list]
Message-ID: <B48C1247138747AD92341AC143297F3F@acros.si>
Date: Mon, 18 Oct 2010 18:53:58 +0200
From: "ACROS Security Lists" <lists@...os.si>
To: <bugtraq@...urityfocus.com>, <full-disclosure@...ts.grok.org.uk>,
<cert@...t.org>, <si-cert@...es.si>
Subject: How Visual Studio Makes Your Applications
Vulnerable to Binary Planting
Microsoft Visual Studio makes it possible to develop a binary planting-positive
(i.e., vulnerable) application without you having to write a single line of code.
Every MFC application seems to be automatically made vulnerable, with those
statically linking MFC libraries actually having the vulnerable code integrated in
their executables, making it harder to deploy patches to users.
http://blog.acrossecurity.com/2010/10/how-visual-studio-makes-your.html
Pleasant reading,
Mitja Kolsek
CEO&CTO
ACROS, d.o.o.
Makedonska ulica 113
SI - 2000 Maribor, Slovenia
tel: +386 2 3000 280
fax: +386 2 3000 282
web: http://www.acrossecurity.com
ACROS Security: Finding Your Digital Vulnerabilities Before Others Do
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists