[VIM] On classifying attacks (fwd)

Steven M. Christey coley at linus.mitre.org
Fri Jul 15 15:07:07 EDT 2005


Interesting.

I *just* answered an e-mail from someone who asked why a vulnerability in
an image processor was "remote" when he didn't process images by using
networks.

I think this example stretches the "Trojan horse" concept slightly, but
it's definitely thinking in the right direction.

But what would the adjective version of "remote attacker" and "local user"
be in a Trojaned context?

- Steve


More information about the VIM mailing list