Jari Ruusu wrote: > then attacker can
overwrite encrypted data at byte offset Z with random junk. When that random
junk at byte offset Z is decrypted, the file name will decrypt to different
random junk, which is not /etc/hosts.deny .
good description of the attack. just a little precision, the attacker can choose, to a certain extend, the inserted data and so the resulting plaintext.
http://off.net/~jme/loopdev_vul.html sec 2.2
- Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/