Linked by Thom Holwerda on Thu 11th Jun 2009 10:00 UTC
Windows Not too long ago, we ran a story informing you of how the auto-elevation feature in Windows 7 is broken in a way that allows malicious programs to silently gain administrative privileges. We wondered if Microsoft was ever going to fix this one before Windows 7 goes final, and even though we're not there yet, a recent article by Mark Russinovich seems to imply pretty strongly that no, Microsoft is not going to fix this.
Thread beginning with comment 368000
To read all comments associated with this story, please click here.
Code 18"
by werfu on Thu 11th Jun 2009 19:32 UTC
werfu
Member since:
2005-09-15

Windows will be as secure as the user in front of the screen is tech saavy and knows about secutiy. The biggest security hole will always be the user in front of the screen. To me UAC is a noble attempt by Microsoft to fix something wrong within Windows. It may not be perfect, but still it is better than nothing.

Now saying that UAC will save your asses is simply as wrong as saying sudo will save it too. What happen when you start synaptics under ubuntu? You get a password prompt. Now, what would happen if it can happen I can write a small script that put itself somewhere in your path where you have the rights to write, and that it look exactly as the gtksudo prompt? After you entered it, I can simply call synaptics with your password and you'll never know I'll be doing nasty things behind your back. Now, take the situation the other way around. Let's say I create a clone of one of MS tool that require elevated rights, than place it somewhere in your start menu hopping you click on it and elevate my nasty exe. Both situation look similar.

A safe on a gun will not stop you from shooting yourself if you set it wrong or don't know how to handle a gun.

Reply Score: -1

RE: Code 18"
by WereCatf on Thu 11th Jun 2009 21:21 in reply to "Code 18""
WereCatf Member since:
2006-02-15

What happen when you start synaptics under ubuntu? You get a password prompt. Now, what would happen if it can happen I can write a small script that put itself somewhere in your path where you have the rights to write, and that it look exactly as the gtksudo prompt? After you entered it, I can simply call synaptics with your password and you'll never know I'll be doing nasty things behind your back

Not possible. You don't have write permissions to /usr/bin (or wherever gtksudo is installed) and that's where libgtksudo executes it from. It doesn't execute from path as that'd be stupid.

Reply Parent Score: 2

RE[2]: Code 18"
by werfu on Fri 12th Jun 2009 13:00 in reply to "RE: Code 18""
werfu Member since:
2005-09-15

I know that be stupid, but what would be stopping me from changing the Synaptics menu entry in your menu and avoiding directly the libgtksudo? I was exposing the fact that most threat come from user actions, not from vulnerabilities.

Reply Parent Score: 1