[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <846ED272-2858-4C48-9E87-7D7F85296430@doxpara.com>
Date: Tue, 31 Aug 2010 16:18:47 -0700
From: Dan Kaminsky <dan@...para.com>
To: "paul.szabo@...ney.edu.au" <paul.szabo@...ney.edu.au>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>,
"cmorris@...odu.edu" <cmorris@...odu.edu>,
"Valdis.Kletnieks@...edu" <Valdis.Kletnieks@...edu>
Subject: Re: DLL hijacking with Autorun on a USB drive
On Aug 31, 2010, at 4:11 PM, paul.szabo@...ney.edu.au wrote:
> Valdis.Kletnieks@...edu wrote:
>
>>> ... The victim is attempting to view a plain text file. Surely
>>> that can be done safely?
>>
>> Only if your OS's security model understands the fact that executable
>> code and data belong in different security domains and thus different
>> rules should apply about what files to "trust" in each category.
>
> Hmm... an OS that cannot "view" plain-text in a safe manner...
> Shame on those who would call that an OS.
>
> Yes, even the Windows security model understands those things.
Notepad.exe can launch from iexplore.exe in some contexts; this open
is safe (and when it isn't, it's Critical).
Notepad.exe can launch from Explorer.exe in some contexts, this open
is not safe.
iexplore.exe has a security model. Explorer.exe doesn't (outside of
standard user). That's the reality, shared by all the desktops.
>
> Cheers, Paul
>
> Paul Szabo psz@...hs.usyd.edu.au http://www.maths.usyd.edu.au/u/psz/
> School of Mathematics and Statistics University of Sydney
> Australia
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists