Pinnacle wrote:
Tony,

Thank you for at least posting two concrete examples of past holes. There was a recent article in zJournal about hacking z/OS, but it was disappointing, limited to what we've discussed here. The article quoted a number of noted gurus (some on this thread), and they all basically said the same thing. Authorized code can hack MVS, unauthorized code can't. Also, like your examples above, none of the examples of hacking quoted in the article were less than 20 years old.

I wonder if anyone was able to exploit SMP/E to run arbitrary code in a privileged state?

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to