BugTraq
Re: On classifying attacks Jul 28 2005 07:26PM
Daniel Weber (djweber alum mit edu) (3 replies)
Re: On classifying attacks Mar 26 2006 02:09AM
Gadi Evron (ge linuxbox org) (1 replies)
Re: On classifying attacks Mar 29 2006 01:19PM
David M Chess (chess us ibm com) (1 replies)
> The difference with other client attacks triggered from remote location
> is the attacker. If he/she connects to you and tries to exploit, the
> service is running and then runs into say, an exception. With a browser
> you go to a remote site, download code, run it locally and get
exploited.
>
> I am not sure what these should be called, but an SQL injection is not a

> remote vulnerability as we term it, despite some similarities.
>
> Many of us still argue on what a worm vs. Trojan vs. virus, etc. are.
> Let's not get to the stage where we have that with vulnerabilities.

But many of us *love* to argue about taxonomies and word meanings (it's
cheaper than booze anyway). *8)

To my mind, if the attacker needs to be logged into an account on the
machine being attacked then the vulnerability is local; if the attacker
just has to be able to push bits to a port then it's remote. If the
attacker has to trick a legitimate user into doing something (including
going to a particular remote site) then it's a Trojan horse. Not hard and
fast boundaries (what if the attacker has to first push some bits to a
port and then fool a user into clicking on a link in some email and then
log into a local account?), but to first order...

Calling an SQL injection a "Trojan horse vulnerability" sounds a little
odd, I admit. But until something better comes along?

DC

[ reply ]
Re: On classifying attacks Mar 30 2006 08:11PM
Gadi Evron (ge linuxbox org) (1 replies)
Re: On classifying attacks Apr 01 2006 11:46AM
john mullee (jmullee yahoo com)
Re: On classifying attacks Aug 02 2005 10:39PM
Shwaine (shwaine shwaine com)
Re: On classifying attacks Jul 24 2005 04:31AM
Duncan Simpson (dps simpson demon co uk)


 

Privacy Statement
Copyright 2010, SecurityFocus