funsec mailing list archives
RE: Is The .WMF Exploit A ConsPiracy Gone Bad?
From: Don Kennedy <zoverlords () yahoo com>
Date: Fri, 13 Jan 2006 07:07:07 -0800 (PST)
The Pod Cast was by Steve Gibson and can be heard here: http://media.grc.com/sn/SN-022-lq.mp3 Curious, if after you listen to how explicit this works, how you will feel then? Todd Towles <toddtowles () brookshires com> wrote: Don wrote:
4. This ("Back Door") can/could be invoked via Email, HTML email, or via an email attachment, or even an IMAGE in a IM session, such as for example in Yahoo Messenger, where one is allowed to have a PHOTO of yourself ("A Drive-By Method of Installation") so when it was said in the Pod Cast that there would be a requirement to VISIT a web site this is not true.
Don't forget HTML based Chat seesion, however your statement makes it sound like Microsoft is trying to hide the many other vectors. This isn't true. They have confirmed what many of us already knew and what you said above in the Security Advisory itself right before the patch was released on Thursday. I don't seen this PodCast, you speak of...but it was either before they released the new "attack vector" information or the person was misinformed.
If the proper investigation is done about this, IMHO, I t! hink it can EASILY be proven that Federal Agencies have in fact USED this method ("A few MORE current and in-place back doors will be publicly admitted too as well") with and without the required paperwork, and that Microsoft actually provided instructions as to the use of these back doors to said agencies.
Proof? Otherwise, I think you might be troll...
It CANNOT be accidental the the WRONG VALUE invokes code, which has NO way to communicate ("Easily") with the source that launched it, accidentally ("Note: while it also is being listed in Microsoft Documentation as LEGACY code") is carried even to Windows Vista. Even if somehow like in DNA, this was a one-in-ten-billion accident, it does NOT explain why this documented LEGACY code was carried over to Windows Vista, and MORE importantly this:
Because some printer programmer were messy and were using it for postscript stuff, already explained on this list one. I am sure Microsoft has a lot of code that could be removed at the risk of breaking stuff...which is what they try not to do.
That WHEN Microsoft REMOVED this FUNCTIONALITY COMPLETELY from the Operating System, no Microsoft Product or application, no 3rd party code or application, no major client's or customers were impacted in ANY! way!
Not true, some printer drivers did not function...it was a small percentage, but it did happen. This was first seen using Ilfak's patch and then with the Microsoft patch. There have been several patches that didn't "break" anything..the Universal PnP patch for example.
If the INTENT of the SETABORTPROC parameter using the Escape procedure WAS to help with Printer failure logic? Where's the PAPER JAM?
See above.. --------------------------------- Yahoo! Photos Showcase holiday pictures in hardcover Photo Books. You design it and well bind it!
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- Is The .WMF Exploit A ConsPiracy Gone Bad? Don Kennedy (Jan 13)
- Re: Is The .WMF Exploit A ConsPiracy Gone Bad? Jonathan Glass (Jan 13)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Larry Seltzer (Jan 13)
- Re: Is The .WMF Exploit A ConsPiracy Gone Bad? Valdis . Kletnieks (Jan 13)
- <Possible follow-ups>
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Blanchard, Michael (InfoSec) (Jan 13)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Todd Towles (Jan 13)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Don Kennedy (Jan 13)
- Re[2]: Is The .WMF Exploit A ConsPiracy Gone Bad? Pierre Vandevenne (Jan 13)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Don Kennedy (Jan 13)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Todd Towles (Jan 13)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Larry Seltzer (Jan 13)
- Re: Is The .WMF Exploit A ConsPiracy Gone Bad? Blue Boar (Jan 13)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Thomas Mannfred Carlsson (Jan 13)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Thomas Mannfred Carlsson (Jan 14)
- Re: Is The .WMF Exploit A ConsPiracy Gone Bad? Gadi Evron (Jan 14)
- Re: Is The .WMF Exploit A ConsPiracy Gone Bad? Valdis . Kletnieks (Jan 14)
- Re: Is The .WMF Exploit A ConsPiracy Gone Bad? Technocrat (Jan 14)
- Re: Is The .WMF Exploit A ConsPiracy Gone Bad? Nick FitzGerald (Jan 14)
- RE: Is The .WMF Exploit A ConsPiracy Gone Bad? Larry Seltzer (Jan 13)