On Fri, 5 May 2006, Damien Miller wrote:

> On Thu, 4 May 2006, Eric Ziegast wrote:
> 
> > An 3l33t hacker might figure out that all he/she had to do was
> > modify the magic number to get their program to run, but most people
> > (including script kiddies) wouldn't figure it out, give up, and move
> > on to softer targets.
> 
> Typical security-through-obscurity junk. If a hacker cared, then they
> would figure it out pretty quickly and it the ones who care that you
> have to worry about.
> 
> In its stronger form of "cryptographically signed binaries", this idea
> isn't so effective either: all an attacker has to do is find *one* code
> execution vulnerability *anywhere* on your system and they are back
> to running arbitrary programs. Search phrack et al. for "userspace
> exec" shellcodes to see that exploiting this is still pretty close to
> script-kiddie levels of difficulty.

Yeah, I agree, but a lot of people do not see that. There are these links
in many people's head that say:

        signed executable can be trusted
        trusted executables are safe

And drawing wrong conclusions from that. Effectively they are saying:

        signing an executable will make the exploitable bugs go away
        
Now that's magic!

        -Otto

Reply via email to