Fake Unix and Linux Advisory - The /dev/null VulnerabilityNov 17, 2008, 04:01 (0 Talkback[s])
(Other stories by Mike Tremell)
No-Size-Fits-All! An Application-Down Approach for Your Cloud Transformation REGISTER >
[ Thanks to Mike Golvach for this link. ]
"The contemporary method of /dev/null drivers is described as the "high suction algorithm" in comparison with the replacement that vendors have made available for their systems. If a malicious user uses a program with low-resistance logic to connect /dev/null back into itself, the device goes critical and can be used for destructive purposes.
0 Talkback[s] (click to add your comment)