Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

VMs generally do not have this type of vulnerability (buffer overrun).

Also, most vulnerabilities in (e.g.) the JVM can only be exploited by running malicious code inside the VM. Here, the attacker is supplying data used by OpenSSL, but is not able to supply arbitrary code.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: