[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
CVE-2016-1886
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 34
Thread images: 4
File: 1429177114622.jpg (12 KB, 258x245) Image search: [Google]
1429177114622.jpg
12 KB, 258x245
>major exploit goes unoticed for 17 years
>FreeBSD is s-secure guys
>s-source code is a-audited, I s-swear
>>
>>54664230
Freebsd and linux in nutshell
>>
>>54664286
open sores trash in a nutshell
based microsoft and apple
>>
>>54664292
>same story, but the fix is never backported to old versions because "buy the new one"
>>
Hey reddit
>>
Better than the bash bug on linux machines going unnoticed for 25.
>>
its just a keyboard bug and not present in hardened kernels.

so what is malware?
>>
>>54664230
And? Has it been exploited at all in the past 17 years?
>>
>>54664230
I'd just like to interject for a moment. What you're referring to as BSD is actually BSD/Nothing-werks or as I like to call it BSD + Nothing-werks. BSD is not part of the operating system itself, but is the kernel that is not covered by the naming system of an operating system as defined by common sense.

Many users run operating systems such as Windows, OSX, and a variant of Linux yet do not use a cumbersome naming system that includes the kernel, without realizing it. Through a peculiar turn of events, Nothing-werkz has been the exception to this for no reason and has just been called "BSD" for no good reason, and many others use the insane, cumbersome term "BSD/Nothing-werkz", mostly because the Nothing-werkz project doesn't want you to think that BSD is a part of Nothing-werkz.
>>
>>54665017
Ask the NSA
>>
>>54664292
>>54664292
>based Apple
http://www.cvedetails.com/vendor/49/Apple.html
Tell me that again when you see OSX had almost as many RCE vulns in 2015 as Windows XP in its entire lifetime.
>>
>>54665497
Also how many Adobe Flash has in a month
>>
>>54664292
wew lad
>>
>>54665017
None of the 5 FreeBSD users were available for comment..
>>
>>54665555
nice quads
>>
>>54665529
>Linux kernel has 32 RCE vulns without Grsec in entire lifetime
>Darwin kernel has 73 in 2015
>>
>>54665524
Flash had 279 in 2015
80 so far this year
>>
Tons of freetards think a program is safe just because the source is available. Its the worst pitfall anyone could be victim to. The Linux kernel was just shown to have a major issue which persisted for years, Linus himself never knew it was there, and the kernel is combed over by thousands of autists daily. There will likely be dozens more instances like this in coming years simply because it is human nature.

On a smaller scale, potentially hundreds of thousands of free programs could contain malware, but no one has found it because they never bothered to look. Even more likely if they did look, they lacked the technical competence to recognize the exploit.

Open is not synonymous with safe, secure, or quality.
>>
>>54665625
And this is only remote code execution vulns
Including everything those numbers would be 314 and 105
>>
>>54664230
>>major exploit goes unoticed for 17 years
Software is made by humans. They will always have exploits. If the exploit didn't go noticed for 17 years, then it wasn't exploited for 17 years, and it was probably not very obvious to anyone.
>>
>>54665529
>IBM
>Cisco
>Adobe
>Mozilla
>PHP
>Wireshark
>etc

Are those all OS distributors? I feel like comparing generic software with operating systems for vulnerabilities is not fair. It's like comparing boxes to houses for construction flaws.
>>
>>54664230
Open source doesn't mean the software is perfect. It means that the community will fix problems as they are notified.
>>
>>54666022
Next time use your browser
>>
File: sw.png (129 KB, 724x611) Image search: [Google]
sw.png
129 KB, 724x611
>newfags fall for the open source meme
>not being proprietary software master race, more secure and stable than linux or BSD can ever be
>>
>>54666272
Wew lad see >>54666243
>>
>>54666272
>he fell for the security through obscurity meme
fresh from the reddit boat right?
>>
>>54664230
>CVE-2016-1886
CVE ID Not Found
>>
>>54666306
If microsoft is the only one who knows about the exploit, you're safer because the criminals can't use it.
>>
>>54664230
Are you retarded and still believe in "absolute security"?
>>
>>54666272
>more secure and stable than linux or BSD can ever be
Sure, Pajeet.
>>
File: 1456516227092.jpg (66 KB, 688x688) Image search: [Google]
1456516227092.jpg
66 KB, 688x688
OPEN SORES

OPEN FESTERING SORES
>>
>>54666272
Rajesh please
>>
>>54666272
>>54666374
http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/
>>
>>54666374
>imblying
Thread replies: 34
Thread images: 4

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.