[Am-info] MS Security flaw

Eric M. Hopper hopper@omnifarious.org
08 Aug 2002 07:07:19 -0500


On Thu, 2002-08-08 at 06:53, Eric M. Hopper wrote:
> On Thu, 2002-08-08 at 05:44, John J. Urbaniak wrote:
> > 
> > Is there any credibility to this?
> 
> I am not a Windows guru.  I've dealt some with the Windows API, but not
> really extensively.  But, from what I know, this article is true. 
> Certainly his broad description of the Windows event system is right on
> target, right down to the lack of authentication.

Also, his characterization of X is flawed.

In X, controls often are individual windows of their own, and not just
pictures.  In fact, the protocol gets really inefficient if you start
having the controls just be pictures.

But, X flags 'synthetic' messages, messages from applications, as just
that.  So it's pretty easy for a program to ignore synthetic messages. 
The model of a malicious application trying to control other
applications on the system was thought of by the designers of X.

OTOH, the X server is a complicated program that usually runs as root in
order to have unfettered access to the display device.  It's possible it
has buffer overflows and other problems that would allow a program to
gain control of the X server.

I know very little about how MacOS works, and whether or not it could
have this vulnerability.

Have fun (if at all possible),
-- 
The best we can hope for concerning the people at large is that they
be properly armed.  -- Alexander Hamilton
-- Eric Hopper (hopper@omnifarious.org 
http://www.omnifarious.org/~hopper) --