![]() ![]() I'm asking about the decoding process of displaying a JPEG, not scripts taking input from remote users, nor files misnamed as. Note this has nothing to do with security of PHP image uploading scripts. Is it sensible to say "the operating system" was decompressing the image to render it? Is there such a thing? Is this description based on some real exploit? There was a patch available for the decompression flaw, but older, rich folks typically had no clue about security patches. When the user viewed the e-mail, the operating system ran a decompression algorithm to render the graphic on-screen it was this decompression algorithm that executed Gragg's malicious script and let him slip inside the user's system-granting him full access. Gragg's e-mail contained a poisoned JPEG of the brokerage logo. ![]() The novel Daemon is frequently praised for being realistic in its portrayal rather than just mashing buzzwords.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |