Interpreters, Open Source, and Security vulnerabilities (was Re: [TriLUG] OT: www.hexblog.com - a fix for the WMF vulernability.)
Rick DeNatale
rick.denatale at gmail.com
Wed Jan 4 21:06:46 EST 2006
On 1/4/06, Tanner Lovelace <clubjuggler at gmail.com> wrote:
> On 1/4/06, Rick DeNatale <rick.denatale at gmail.com> wrote:
> > I don't remember how many recall the "obfuscated voting machine"
> > contest that was covered on /. a few years back. The winner was
> > portable C code which cooked the results, even only doing this on the
> > date of the election. Even with the source code, the knowledge that
> > it was crooked, AND a hint that it involved a buffer overflow, the
> > source code looked perfectly reasonable, to the extent that it
> > required stepping through the code with a debugger to find which line
> > of code changed the result, and then a good bit of head scratching to
> > figure out how it was doing it.
>
> Link, please?
Google is my search engine, I shall not want:
http://graphics.stanford.edu/~danielrh/vote/vote.html
--
Rick DeNatale
Visit the Project Mercury Wiki Site
http://www.mercuryspacecraft.com/
More information about the TriLUG
mailing list