[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <11423.1092760192@www41.gmx.net>
Date: Tue, 17 Aug 2004 18:29:52 +0200 (MEST)
From: "Oliver Schneider" <Borbarad@...pro.net>
To: "Jérôme" ATHIAS <jerome.athias@...amail.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: First vulnerabilities in the SP2 - XP ?...
Hi,
> http://www.heise.de/security/artikel/50051
I also read this yesterday (the German version) and I think it's not a
vulnerability. It's IMO a misconception in the way how SP2 treats alien
executables. And on the other hand it does not actually lower the value of
SP2 concerning security - because the rest of SP2 already boosted security
(this time despite compatibility issues - thanks to MS for finally skipping
compatibility in favor of security). But I agree with the author that MS
should fix this anyway!
Can someone please check if ShellExecute()/ShellExecuteEx() behave different
from the CreateProcess-functions *)? Could that be the reason?
Where is the information stored, that a file was downloaded - ADS? - EAs?
... some arcane new feature?
Oliver
*) CreateProcess, CreateProcessAsUser, CreateProcessWithLogonW,
CreateProcessWithTokenW
--
---------------------------------------------------
May the source be with you, stranger ... ;)
Powered by blists - more mailing lists