[VIM] On classifying attacks (fwd)
Steven M. Christey
coley at linus.mitre.org
Fri Jul 15 15:07:07 EDT 2005
I *just* answered an e-mail from someone who asked why a vulnerability in
an image processor was "remote" when he didn't process images by using
I think this example stretches the "Trojan horse" concept slightly, but
it's definitely thinking in the right direction.
But what would the adjective version of "remote attacker" and "local user"
be in a Trojaned context?
More information about the VIM