Unwanted physical access to a computer by a malicious individual IS a concern, however, embedding a malicious terminal command inside a stack does NOT require physical access to the computer (of course). Emphasis mine on the 'of course'. Windows and Linux will let it through unchallenged. (Yes, newer versions of MacOS will prompt to allow LCC/OXT use of the terminal commands) - but in the real world, with mixed operating systems on the network - if you want to run malicious terminal code - you'd just use a stack designed to run the malicious part on Windows or Linux (or an older version of MacOS)... no physical access to the computer required.
Is forever really forever?
Moderators: FourthWorld, heatherlaine, Klaus, kevinmiller
-
richmond62
- Livecode Opensource Backer

- Posts: 10355
- Joined: Fri Feb 19, 2010 10:17 am
Re: Is forever really forever?
-
FourthWorld
- VIP Livecode Opensource Backer

- Posts: 10089
- Joined: Sat Apr 08, 2006 7:05 am
- Contact:
Re: Is forever really forever?
CVE number?
Richard Gaskin
LiveCode development, training, and consulting services: Fourth World Systems
LiveCode Group on Facebook
LiveCode Group on LinkedIn
LiveCode development, training, and consulting services: Fourth World Systems
LiveCode Group on Facebook
LiveCode Group on LinkedIn