On May 30, 2011, at 2:45 AM, John Stalberg wrote:

> So now what? The installer could have spread files to every and anywere that 
> admin can wright to. That could surely be inconvinient. Use your fantasy and 
> it is clear this would need a moment of cleaning. Preferably with search for 
> the latest of the greatest malware files on your host but on the other hand, 
> it is soon gone and we can go back to were we were. As a matter of fact, the 
> installer isn't needed here as the bundle itself can with the executable 
> spread its crap in the same way (we have a non super user doing the installer 
> task).

Indeed.  The malware could have stayed in Downloads for all that, and maybe 
altered ~/Library/Preferences/loginwindow.plist to cause itself to be launched 
at every login to do whatever evil it wants to do.  There's no more privilege 
to be had for it simply from residing in /Applications, or any other location 
that is admin-writeable without an explicit admin password.  The only advantage 
to be had there is that it would end up in the search path of other users of 
that Mac, but I would estimate that 99% of Macs out there HAVE only the one 
user.

-- 
  Macs R We -- Personal Macintosh Service and Support
    in the Wickenburg and far Northwest Valley Areas.
                            http://macsrwe.com

_______________________________________________
MacOSX-talk mailing list
[email protected]
http://www.omnigroup.com/mailman/listinfo/macosx-talk

Reply via email to