Quote:
Originally Posted by Unknown Rabbit
I think the chances are very low of people distributing malicious software through JJ2 scripts.
|
Well, it really comes down to the implementation and design. If you allow the scripting engine to use direct memory access, script writers can likely use this feature to overwrite some variables or function pointers, which is an excellent candidate for buffer overflows and remote code execution. The scripting engine should be implemented carefully to prevent this kind of misuse.
__________________
<a href="http://nmap.org/"><img border="0" alt="Nmap Security Scanner" src="http://images.insecure.org/nmap/images/prop/nmap_bnr_matrix_pfos.gif"/></a>
|