Interpreters, Open Source, and Security vulnerabilities (was Re: [TriLUG] OT: www.hexblog.com - a fix for the WMF vulernability.)

Rick DeNatale rick.denatale at gmail.com
Wed Jan 4 21:06:46 EST 2006


On 1/4/06, Tanner Lovelace <clubjuggler at gmail.com> wrote:
> On 1/4/06, Rick DeNatale <rick.denatale at gmail.com> wrote:

> > I don't remember how many recall the "obfuscated voting machine"
> > contest that was covered on /. a few years back.  The winner was
> > portable C code which cooked the results, even only doing this on the
> > date of the election.  Even with the source code, the knowledge that
> > it was crooked, AND a hint that it involved a buffer overflow, the
> > source code looked perfectly reasonable, to the extent that it
> > required stepping through the code with a debugger to find which line
> > of code changed the result, and then a good bit of head scratching to
> > figure out how it was doing it.
>
> Link, please?

Google is my search engine, I shall not want:

http://graphics.stanford.edu/~danielrh/vote/vote.html

--
Rick DeNatale

Visit the Project Mercury Wiki Site
http://www.mercuryspacecraft.com/



More information about the TriLUG mailing list