From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,bc1361a952ec75ca X-Google-Attributes: gid103376,public X-Google-ArrivalTime: 2001-08-01 14:25:53 PST Path: archiver1.google.com!newsfeed.google.com!newsfeed.stanford.edu!news.tele.dk!194.25.134.62!newsfeed00.sul.t-online.de!newsfeed01.sul.t-online.de!t-online.de!newsfeed.germany.net!newsfeed2.easynews.net!easynews.net!news.cid.net!news.enyo.de!news1.enyo.de!not-for-mail From: Florian Weimer Newsgroups: comp.lang.ada Subject: Re: How Ada could have prevented the Red Code distributed denial of service attack. Date: Wed, 01 Aug 2001 23:41:49 +0200 Organization: Enyo's not your organization Message-ID: <8766c7h2zm.fsf@deneb.enyo.de> References: <%CX97.14134$ar1.47393@www.newsranger.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Xref: archiver1.google.com comp.lang.ada:10987 Date: 2001-08-01T23:41:49+02:00 List-Id: tmoran@acm.org writes: >>Exploitable buffer overflows are a known *class* of bugs that are pretty >>much endemic with C (and C++ that uses C) code. > Of course they also depend on not using hardware designed with > security in mind. Could you elaborate on that, please?