On Tue, 2003-09-23 at 22:08, Guido Schimmels wrote: > Am 23.09.2003 20:41:46 schrieb(en) George: > > On Tue, Sep 23, 2003 at 05:00:35PM +0200, Guido Schimmels wrote: > > > And security holes almost always only affect commandline tools and > > > popular shared libraries. How does a remote exploit for GIMP look > > like? > > > > Like an obscure library doing a buffer overflow on reading an obscure > > picture > > And then what? Please elaborate the remote exploit scenario. Local > exploits are irrelevant. Why? -- Andrew Sobala <aes gnome org>
Attachment:
signature.asc
Description: This is a digitally signed message part