I think the greater danger is from dual booting windows & linux (with or without wubi). An infected windows machine could write malware directly to the unbooted linux partition. This would be both an easier way of spreading an infection and more effective since *any* windows/linux system would be vulnerable to it - not just those that were installed via wubi.

In fact, even the generic dual boot vulnerability seems like a pretty convoluted way to spread malware. Once you have control of a windows machine, the thing to do would be to *use* that windows machine to carry out your evil plot - not try to infect an unused linux partition in the hope that it might someday be booted. The windows -> wubi -> linux risk seems even lower.

Once the wubi install process is complete you *do* end up with a linux system that, at a low level, piggybacks off of the windows boot system to work. It bothers me too but just as a matter of principle - not for security reasons.

- Dave



Allen Brown wrote:
Just wait until somebody comes up with a Windoze worm that targets
Wubi.  Then whenever you boot Wubi you get the infection.

Hmm.  I suppose that's not very likely.  But I'm still nervous about
entering a "secure" system by way of an insecure system.  It just
seems wrong.

_______________________________________________
EUGLUG mailing list
[email protected]
http://www.euglug.org/mailman/listinfo/euglug

Reply via email to