Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: [Full-disclosure] Internet Explorer 7 - Still Spyware Writers' Heaven
From: Joshua Gimer (jgimergmail.com)
Date: Sat Nov 04 2006 - 14:15:35 CST
If Microsoft is not planning on providing a fix for this until Vista, I can
see a worm coming from this. Forgive me if I don't know how this works in
the windows world, but when it is looking for this DLL, does it take the
first one that it finds within your path; like in UNIX? Or does it look in
all directories within your path and then decide? I am guessing the former,
but I am just clarifying.
On 11/3/06, Eliah Kagan <degeneracypressuregmail.com> wrote:
> On 11/2/06, Roger A. Grimes wrote:
> > So, if you're statement is accurate that malware would need to be placed
> > in a directory identified by the PATH statement, we can relax because
> > that would require Administrator access to pull off. Admin access would
> > be needed to modify the PATH statement appropriately to include the
> > user's desktop or some other new user writable location or Admin access
> > would be needed to copy a file into the locations indicated by the
> > default PATH statement.
> It would not require *administrator* access--non-administrator users
> can still add things to their own PATHs, just not to the universal,
> system PATH. (See Control Panel > System > Advanced > Environment
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/