June 2, 2005 ECS 153, Introduction to Computer Security Slide #1
Comparison and Analysis
- Point of view
– If multiple processes involved in exploiting the flaw, how does that affect classification?
- xterm, fingerd flaws depend on interaction of two
processes (xterm and process to switch file objects; fingerd and its client)
- Levels of abstraction
– How does flaw appear at different levels?
- Levels are abstract, design, implementation, etc.