[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: First vulnerabilities in the SP2 - XP ?...
- To: "Jérôme" ATHIAS <jerome.athias@xxxxxxxxxxxx>
- Subject: Re: First vulnerabilities in the SP2 - XP ?...
- From: "Oliver Schneider" <Borbarad@xxxxxxxxxx>
- Date: Tue, 17 Aug 2004 18:29:52 +0200 (MEST)
Hi,
> http://www.heise.de/security/artikel/50051
I also read this yesterday (the German version) and I think it's not a
vulnerability. It's IMO a misconception in the way how SP2 treats alien
executables. And on the other hand it does not actually lower the value of
SP2 concerning security - because the rest of SP2 already boosted security
(this time despite compatibility issues - thanks to MS for finally skipping
compatibility in favor of security). But I agree with the author that MS
should fix this anyway!
Can someone please check if ShellExecute()/ShellExecuteEx() behave different
from the CreateProcess-functions *)? Could that be the reason?
Where is the information stored, that a file was downloaded - ADS? - EAs?
... some arcane new feature?
Oliver
*) CreateProcess, CreateProcessAsUser, CreateProcessWithLogonW,
CreateProcessWithTokenW
--
---------------------------------------------------
May the source be with you, stranger ... ;)