BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
Defense in depth -- the Microsoft way (part 8): execute everywhere! Aug 24 2013 09:32PM
Stefan Kanthak (stefan kanthak nexgo de)
Hi,

since it's start about 20 years ago Windows NT supports (fine grained)
ACLs, including the permission "execute file".

In their very finite wisdom Microsoft but decided back then to have
this permission set on EVERY file a user creates (and assumes it is
set on local and remote file systems whi...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus