pcandmactech

All things PC and Mac related that I can fix and those that I can't.

Wednesday, September 1, 2010

An update on the DLL-preloading remote attack vector

This class of vulnerabilities does not enable a “driveby” or “browse-and-get-owned” 0-click attack. To be exploited, a victim would need to browse to a malicious WebDAV server or a malicious SMB server and double-click a file in the Windows Explorer window that the malicious server displays. Let’s walk through an example of what an attack might look like:
daveangel at 10:47 PM

No comments:

Post a Comment

‹
›
Home
View web version

About Me

daveangel
PC and Apple computer programmer with focus on security tech.
View my complete profile
Powered by Blogger.