Announcement
Collapse
No announcement yet.
GCC 12 Ready To Help Fend Off Trojan Source Attacks
Collapse
X
-
Well that's a shame, I was looking forward to seeing what the The International Obfuscated C Code Contest (https://www.ioccc.org) did with this.
- 2 likes
Comment
-
Originally posted by stormcrow View Post
Without input checking on the variable that's being fed to %s it could potentially be disastrous. This is the kind of thing that launched a thousand DOS conditions. It's probably the same problem Apple ran into with their OS(es) and a DOS condition with specially crafted WIFI SSIDs.
Example, let's say the output of the printf("%s\n") the variable contains improperly checked input from unknown users and is fed to a pipe. The piped command then executes whatever it's fed with an immediate enter. That's kinda out there, but the prevalence of piped output as unverified input is pretty common either on the shell prompt or in scripts. I don't know if that's what you're looking for.
The kick in the nuts was the day before when I realized that I over-complicated things and that it was better to start over.
Comment
Comment