How dangeorus is TOCTTOU attack?

Discussion in 'other firewalls' started by CoolWebSearch, Nov 29, 2013.

Thread Status:
Not open for further replies.
  1. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,216
    And what it exactly do?
    There is an explanation on wikipedia:
    http://en.wikipedia.org/wiki/Time_of_check_to_time_of_use

    But I'm still not following this, I think I need more lessons...
    How dangerous it is, can it hack into your computer or not?
    Do all firewalls (both software and hardware/routers) protect against this form of attack?
     
  2. explanoit

    explanoit Registered Member

    Joined:
    Dec 1, 2013
    Posts:
    28
    Location:
    USA
    Interesting question. Firewalls would not have involvement in this directly.

    This is a class of software design issue or bug. This is not something an end-user needs to worry about since there's little or nothing they can do about it. It's a type of exploit method in narrow situations where an attacker already has a foothold or path into a system, it's not a specific attack or ghost key.
     
    Last edited: Dec 1, 2013
Loading...
Thread Status:
Not open for further replies.