[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive
- To: "paul.szabo@xxxxxxxxxxxxx" <paul.szabo@xxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive
- From: Dan Kaminsky <dan@xxxxxxxxxxx>
- Date: Tue, 31 Aug 2010 16:18:47 -0700
On Aug 31, 2010, at 4:11 PM, paul.szabo@xxxxxxxxxxxxx wrote:
> Valdis.Kletnieks@xxxxxx wrote:
>
>>> ... The victim is attempting to view a plain text file. Surely
>>> that can be done safely?
>>
>> Only if your OS's security model understands the fact that executable
>> code and data belong in different security domains and thus different
>> rules should apply about what files to "trust" in each category.
>
> Hmm... an OS that cannot "view" plain-text in a safe manner...
> Shame on those who would call that an OS.
>
> Yes, even the Windows security model understands those things.
Notepad.exe can launch from iexplore.exe in some contexts; this open
is safe (and when it isn't, it's Critical).
Notepad.exe can launch from Explorer.exe in some contexts, this open
is not safe.
iexplore.exe has a security model. Explorer.exe doesn't (outside of
standard user). That's the reality, shared by all the desktops.
>
> Cheers, Paul
>
> Paul Szabo psz@xxxxxxxxxxxxxxxxx http://www.maths.usyd.edu.au/u/psz/
> School of Mathematics and Statistics University of Sydney
> Australia
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/