Linked by Thom Holwerda on Sat 31st Jan 2009 10:45 UTC
Privacy, Security, Encryption Yesterday, we reported on the security flaw in Windows 7's UAC slider dialog, and today, Microsoft has given a response to the situation, but it doesn't seem like the company intends to fix it. "This is not a vulnerability. The intent of the default configuration of UAC is that users don't get prompted when making changes to Windows settings. This includes changing the UAC prompting level." I hope this reply came from a marketing drone, because if they intend on keeping this behaviour as-is in Windows 7 RTM, they're going to face a serious shitstorm - and rightfully so. Let's hope the Sinfoskies and Larson-Greens at Microsoft rectify this situation as soon as possible.
Thread beginning with comment 346355
To read all comments associated with this story, please click here.
by jbauer on Sat 31st Jan 2009 12:02 UTC
Member since:

So, Mr. Marketing Drone... what happens if it's a program changing the setting instead of a user as the sample script actually demonstrated?

I can't believe they've gone through all the pain with UAC in Vista to f--k up big way like this now ;)

Reply Score: 4

Ubuntu is vulnerable to UAC Exploit!
by sakeniwefu on Sat 31st Jan 2009 16:22 in reply to "Unbelievable"
sakeniwefu Member since:

If you allow this script to run on a Ubuntu machine, it will disable sudo prompts for admin accounts without prompting for any password.

sudo update-alternatives --set editor /usr/bin/vim.tiny > /dev/null
echo :22^M/%^Md0:wq^M | sudo visudo 2> /dev/null
echo ****DANCING BUNNIES****

^M is ctrl-v+ctrl-m

- Type it and save as

- Open up a terminal

- Type:

$ sudo chmod +x ./ # Type in your password to allow execution
$ ./

What happens? You see dancing bunnies.

Reply Parent Score: 1

perspectoff Member since:

Throw your Ubuntu laptop in the bathwater and it has the risk of short-circuiting!

Don't be an idiot. You have to intentionally destroy your computer with these steps to destroy your computer.

Reply Parent Score: 1

Vanders Member since:

$ sudo chmod +x ./ # Type in your password to allow execution
$ ./

What happens? You see dancing bunnies.

Yes, because sudo has cached the password from when you just executed "sudo chmod"

What happens if you chmod the script then try to run it five minutes from now? You see a sudo password prompt.

Reply Parent Score: 1

slight Member since:

Er no, you'll get a sudo password request. Unless of course you just ran sudo in the same terminal beforehand, which I presume you did while writing the script..


Reply Parent Score: 1