Just like the *real* Avril

Off topic, but don't go too far overboard - after all, we are watching...heh.
Murgatroyd

Just like the *real* Avril

Postby Murgatroyd » Thu Sep 16, 2004 6:37 am

So good looking on the outside - a dangerous piece of code on the inside.

http://news.bbc.co.uk/2/hi/technology/3661678.stm

User avatar
Posts: 2840
Joined: Thu Feb 13, 2003 12:54 pm

Postby cavalierlwt » Thu Sep 16, 2004 7:55 am

WTF? How does Windows work, under the hood that is?
I'm obviously no hacker, but I consider myself a fair programmer, or at least I was at one time. I have a rudimentary understanding of the Windows OS. I can't figure out how the hell Windows works so that a buffer overun would cause a hacker to be able to take control of your machine. Anyone know how this type of thing works--in simple terms?
What the hell does Windows do, attempt to 'run' any data that overflows a buffer??
Failing to plead
with a throat full of dust
Life falls asleep
in a fetal position.

LordShard

Postby LordShard » Thu Sep 16, 2004 5:14 pm

Easy way around this, Don't use Internet Exploder! I use opera which is not vulnerable to this problem, as well as probably mozzila, and firefox.

User avatar
Posts: 10599
Joined: Wed Mar 19, 2003 5:42 pm
Location: Cheltenham, England

Postby SavageParrot » Thu Sep 16, 2004 6:17 pm

Macs rule!
Image
TT clan forums

You knows I still wuvs ya rtcw:beer: ;)

User avatar
Posts: 6304
Joined: Sat Jan 04, 2003 5:43 am
Location: Quebec, Canada

Postby Chacal » Thu Sep 16, 2004 6:45 pm

Originally posted by cavalierlwt
Anyone know how this type of thing works


Yes.

--in simple terms?


No.



Anyway, t's not a vulnerability that's specific to Windows. Most programs have them. But Windows has a LOT of them.
Chacal


[SIZE="1"][color="LightBlue"]Reporter: "Mr Gandhi, what do you think of western civilization?"
Gandhi: "I think it would be a great idea."[/color][/SIZE]

Posts: 91
Joined: Sat Nov 08, 2003 12:42 pm
Location: Herndon, VA

Postby amnion » Thu Sep 16, 2004 7:35 pm

any data that overflows can be crafted to execute with the privilege level of the program that was compromised, leading to an attack executing arbitrary code, can lead to the box being compromised totally...
OpenBSD and some other OS's make this harder to do...
Image
I am not an addict...
Tyan Thunder K8WE - Dual Opteron 254 4GB PC3200 RAM, BFG 7800GTX OC.

User avatar
Posts: 2840
Joined: Thu Feb 13, 2003 12:54 pm

Postby cavalierlwt » Sat Sep 18, 2004 3:32 pm

Yeah, I understand the concept of privilege levels and windows lack of them. The thing that throws me is is the overflow resulting in the some code getting executed. When I think of overflows, I think of data maybe getting written to memory that should be protected, outside of reserved memory etc. This usually causes a program, perhaps the OS itself, to lock up. I'm just trying to figure out the logic of the OS looking at a buffer overflow, then attempting to 'run' the overflowing data as though it were an executable.
Failing to plead
with a throat full of dust
Life falls asleep
in a fetal position.

Return to The Smokin' Room

Who is online

Users browsing this forum: Bing [Bot], Google [Bot] and 44 guests