pcandmactech
All things PC and Mac related that I can fix and those that I can't.
Wednesday, September 1, 2010
An update on the DLL-preloading remote attack vector
This class of vulnerabilities does not enable a “driveby” or “browse-and-get-owned” 0-click attack. To be exploited, a victim would need to browse to a malicious WebDAV server or a malicious SMB server and double-click a file in the Windows Explorer window that the malicious server displays. Let’s walk through an example of what an attack might look like:
No comments:
Post a Comment
‹
›
Home
View web version
No comments:
Post a Comment