From mboxrd@z Thu Jan 1 00:00:00 1970 Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Dmitry A. Kazakov" Newsgroups: fr.comp.lang.ada,comp.lang.ada Subject: Re: Canal+ crash Date: Sun, 21 Jul 2024 11:34:14 +0200 Organization: A noiseless patient Spider Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sun, 21 Jul 2024 11:34:13 +0200 (CEST) Injection-Info: dont-email.me; posting-host="e65d71e4824229d2f452f6602bfcd7bc"; logging-data="35316"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX191F1YVywK5CA4Esixaj0aNJNh5PO104vM=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:mZ2eIem0BgqOEocM4o4rbRInNoA= Content-Language: en-US In-Reply-To: Xref: news.eternal-september.org fr.comp.lang.ada:2292 comp.lang.ada:66236 List-Id: On 2024-07-21 11:10, J-P. Rosen wrote: > Le 21/07/2024 à 10:00, Niklas Holsti a écrit : >> But certainly, most attacks on SW have used functional bugs such as >> buffer overflows. > > A problem that has been solved since 1983, and even before (Pascal had > bounds checking). Sigh... Yup, however some crackpot could always suggest an attack on bounds checking, e.g. exception vs. not, index to bounds comparison dependent on the actual values etc, and then produce a lengthy paper on a constructed absolutely unrealistic scenario... (:-)) -- Regards, Dmitry A. Kazakov http://www.dmitry-kazakov.de