Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's not just four stacks (or more, because the article also mentions Apple Macs and BSD) that you have to "mess up". You also have to mess them up in such a way that you can exploit them without a disk even being mounted. That four/five/six stacks are all exploitable to this extent because of buffer overruns (or similar) seems implausible.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: