Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: [FD] Executable installers are vulnerable^WEVIL (case 56):arbitrary code execution WITH escalation of privilege via rufus*.exe
Aug 06 2018 05:16PM
Andrius Duksta (duk danskebank lt)
Sorry, but the viable/practical attack vector on this one is practically non-existent. I really can't see anyone actually using this as a real-life attack. The circumstances required to succeed are such that if this attack works, it's waaay too late to blame Rufus as your system was obviously alread...
[ more ]
Copyright 2010, SecurityFocus