BugTraq
when will AV vendors fix this??? Aug 05 2006 07:20AM
Bipin Gautam (gautam bipin gmail com) (4 replies)
Re: when will AV vendors fix this??? Aug 07 2006 08:35PM
Paul Schmehl (pauls utdallas edu) (1 replies)
Re: when will AV vendors fix this??? Aug 08 2006 02:09AM
Bipin Gautam (gautam bipin gmail com)
> >
> This is similar to the problem of alternative data streams.
> Essentially, the work needed to solve this problem isn't worth the
> expenditure of time and effort, because the file, in order to infect the
> system, has to be executed. Once the file is executed "normal"
> on-access scanning will catch the exploit *if* it is known. (If it's
> unknown, it doesn't matter anyway.) Yes, on-demand scanning won't "see"
> the file, but even malicious files are benign until they are run.
>

i still insist, it might be a minor glitch to NOT ALLOW even admins to
access a private file directly, but it isn't an issue with windows at
all!!!
I thought the the files should be accessed via "SeTcbPrivilege" BUT it
doesn't. )O;

but hey, most of "the file undelete utilities" already do this.....
if you try reading/copying a EXISTING file (via sys admin privilage)
using (say Restorer2000 Demo) it effectively bypasses file permission
regardless if it...... & can read the file! there must be another
undocumented? API doing this???

another note, even WINDOWS ONECAIR is pron to this bug.

-bipin

[ reply ]
Re: when will AV vendors fix this??? Aug 07 2006 06:26PM
Marius Huse Jacobsen (mahuja c2i net)
RE: when will AV vendors fix this??? Aug 07 2006 06:20PM
Thomas D. (whistl0r googlemail com)
Re: when will AV vendors fix this??? Aug 05 2006 08:35AM
Denis Jedig (seclists syneticon de)


 

Privacy Statement
Copyright 2010, SecurityFocus