Re: White paper: Exploiting the Win32 API.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



"John Howie" <JHowie@securitytoolkit.com> writes:

> This class of attack is not new, it has been discussed before. While you
> can assert that the blame lies with Microsoft (and I'll admit they do
> have some responsibility to address the problem you describe)

A bit of MSDN browsing revealed that Microsoft has already "fixed" the
vulnerabilites, despite the claim that this was impossible.  The
concepts are called "window stations" and "desktops", and there is
plenty of documentation.  Everything is there: separate sets of hooks,
separate message queues, and so on.

Maybe there are some flaws, but the overall design seems to be sound.

-- 
Florian Weimer 	                  Weimer@CERT.Uni-Stuttgart.DE
University of Stuttgart           http://CERT.Uni-Stuttgart.DE/people/fw/
RUS-CERT                          fax +49-711-685-5898

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux