Bonum Certa Men Certa

Reader's Article: Does Microsoft Create Security FUD Against Rivals?

"Working behind the scenes to orchestrate "independent" praise of our technology, and damnation of the enemy's, is a key evangelism function during the Slog. "Independent" analyst's report should be issued, praising your technology and damning the competitors (or ignoring them). "Independent" consultants should write columns and articles, give conference presentations and moderate stacked panels, all on our behalf (and setting them up as experts in the new technology, available for just $200/hour). "Independent" academic sources should be cultivated and quoted (and research money granted). "Independent" courseware providers should start profiting from their early involvement in our technology. Every possible source of leverage should be sought and turned to our advantage."

--Microsoft, internal document [PDF]



Reader's summary: Microsoft first to fix pool overruns vulnerability, or is it?

Microsoft invents a 'fix' for some bogus security bug and 'Independent Security Evaluator' heaps praise on Microsoft and talks up the 'vulnerability' in Mac OS X and GNU/Linux.



The article is a little short on any actual details of the exploit. I thought 'Safe unlinking' of 'doubly linked lists' was de regur on any information processing system.

“The article is a little short on any actual details of the exploit.”I hadn't heard the term before, and I do try and keep up. Are there any actual examples of 'pool overruns', in the public domain, that can be successfully run on Mac OS X and GNU/Linux?

To quote: "Independent Security Evaluators has successfully exploited weaknesses in Windows, OS X and Linux. "I think they're trying to stay ahead of the curve" [...] This simple check blocks the most common exploit technique for pool overruns"

Where and how did Microsoft come out with a fix so quickly and why not design a MMU that isn't vulnerable to 'pool overruns' rather than having to check for them, after the fact, so to speak?

To quote again: “It doesn't mean pool overruns are impossible to exploit, but it significantly increases the work for an attacker

Comments

Recent Techrights' Posts

Links 01/11/2025: Microsoft Distributes Malware Again, Radio Free Asia Shut Down by Dictator
Links for the day
 
Links 01/11/2025: Microsoft Azure Goes Offline Again
Links for the day
November is Here, Anniversary Party This Coming Friday
Expect this site to return to its normal publication pace either by tomorrow or Monday
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, October 31, 2025
IRC logs for Friday, October 31, 2025
Gemini Links 01/11/2025: Synergetic Disinformation and Software Maintenance
Links for the day
IRC Proceedings: Thursday, October 30, 2025
IRC logs for Thursday, October 30, 2025
IRC Proceedings: Wednesday, October 29, 2025
IRC logs for Wednesday, October 29, 2025
Slopwatch: Brian Fagioli, Google News, and Other LLM Slopfarms
Why does Google News keep promoting these fake articles?
Links 29/10/2025: Amazon Kept "Data Center Water Use Secret", "Abuse of Power" Against Media
Links for the day
Gemini Links 29/10/2025: "My Hardware Specs" and "Goodbye Debian…"
Links for the day
EPO Cocainegate: Feedback and Clarifications
Part III will come out soon
Links 29/10/2025: "US Military Is Destroying the Planet Beyond Imagination" and Boat Strikes Deemed Unlawful
Links for the day
Quality Comes First (Techrights Search)
It's generally working already, but we wish to polish it some more
Techrights Party Countdown
Late next week we'll be holding a party near our home