[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Internet Explorer 7 - Still Spyware Writers' Heaven

So all the malware writer has to do now is figure out how to do the
initial exploit in the first place, that would then allow them to muck
with path statements or place code in path executable areas. I mean, do
you get it, yet? If the malware writer figures out how do the initial
exploit, anything can be done, not just the path tricks.  

My WhereWindowsMalwareHides
dated_where_w.html)contains over 145 different tricks and locations
where malware can hide and live, along with the path trick. Your point
is a valid point, but it's been a known issue for years. 

You can't skip over the hardest part, the initial exploit, and start
picking on one of over a hundred ways to muck with Windows users and
call "IE 7 a Spyware Writer's Heaven". I mean you can, but it looks like
you're grasping at straws. At least tell us something new, and not
something that's been documented for years.


-----Original Message-----
From: Eliah Kagan [mailto:degeneracypressure@xxxxxxxxx] 
Sent: Friday, November 03, 2006 9:26 PM
To: full-disclosure@xxxxxxxxxxxxxxxxx; bugtraq@xxxxxxxxxxxxxxxxx
Subject: Re: Internet Explorer 7 - Still Spyware Writers' Heaven

On 11/2/06, Roger A. Grimes wrote:
> So, if you're statement is accurate that malware would need to be 
> placed in a directory identified by the PATH statement, we can relax 
> because that would require Administrator access to pull off. Admin 
> access would be needed to modify the PATH statement appropriately to 
> include the user's desktop or some other new user writable location or

> Admin access would be needed to copy a file into the locations 
> indicated by the default PATH statement.

It would not require *administrator* access--non-administrator users can
still add things to their own PATHs, just not to the universal, system
PATH. (See Control Panel > System > Advanced > Environment