Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Bush2000
Bush2000 wrote:
the rest depend upon an improbable chain of events, such as (a) browsing to a malicious webpage in IE or (b) running a malicious piece of software.
Actually, IE can be made to access a malicious web page if you view a maliciously constructed e-mail message in Outlook Express. That kind of exploit can affect a lot of users and compromise a whole bunch of Windows systems.

Also, many versions of Outlook Express were configured by default to open certain types of attachments automatically, and an email sent to a user who hasn't secured that "feature" can run a malicious piece of software. Again, this type of exploit will result in a whole bunch of compromised Windows systems.

Bush2000 wrote:
You don't need an account. A kernel buffer overflow can be hijacked to create an account with elevated privilege.
The exploit referred to in this article requires access to a local account on the target machine. It almost requires shell access to the target machine, though it might be possible, if you are very, very good and/or very, very lucky, to exploit this vulnerablility with a web hosting account or similar non-shell access account on a particularly poorly secured server.

The vulnerability addressed in this article doesn't allow an unauthenticated remote system to create an account on the target machine. This is true for most Linux Kernel vulnerabilities that have been discovered recently.

BTW, this is the opposite of the MS-Blaster exploit and several other recent exploits to MS Windows. Many of the Windows exploits that have been discovered recently allow unauthenticated remote connections to compromise the target Windows system.

132 posted on 01/12/2004 7:31:29 AM PST by cc2k
[ Post Reply | Private Reply | To 88 | View Replies ]


To: cc2k
Actually, IE can be made to access a malicious web page if you view a maliciously constructed e-mail message in Outlook Express. That kind of exploit can affect a lot of users and compromise a whole bunch of Windows systems.

Only if you assume you're running an unpatched version of Outlook Express.

The vulnerability addressed in this article doesn't allow an unauthenticated remote system to create an account on the target machine. This is true for most Linux Kernel vulnerabilities that have been discovered recently.

Local exploits open the door to deploy malware which elevates privileges, etc. It's serious, despite what you're suggesting. Frankly, if you examine past Windows kernel vulnerabilities, you will find that practically none of them are remote exploits.
138 posted on 01/12/2004 8:58:36 AM PST by Bush2000
[ Post Reply | Private Reply | To 132 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson