Re: [FD] Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege

2016-01-15 Thread Michel Arboi
On 11 January 2016 at 15:37, Stefan Kanthak wrote: > Which but does not mean/imply that everybody abandons TrueCrypt. The project has been abruptly killed by the developers without any clear explanation. There's something fishy and it cannot be trusted anymore. Spend your time and energy on forks

Re: [FD] Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege

2016-01-15 Thread Stefan Kanthak
"Michel Arboi" wrote: > On 11 January 2016 at 15:37, Stefan Kanthak wrote: >> Which but does not mean/imply that everybody abandons TrueCrypt. > > The project has been abruptly killed by the developers without any > clear explanation. There's something fishy and it cannot be trusted > anymore.

Re: [FD] Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege

2016-01-11 Thread Stefan Kanthak
"Sarah Allen" wrote: > TrueCrypt ceased development back in 2014. Which but does not mean/imply that everybody abandons TrueCrypt. > Please refer to the below link to migrate to an alternative > (BitLocker) from TrueCrypt. > http://truecrypt.sourceforge.net/ STOP posting on top, but DON'T stop

Re: [FD] Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege

2016-01-11 Thread Sarah Allen
TrueCrypt ceased development back in 2014. Please refer to the below link to migrate to an alternative (BitLocker) from TrueCrypt. http://truecrypt.sourceforge.net/ From: Stefan Kanthak Sent: Friday, 8 January 2016 9:32 PM To: fulldisclosure@seclists.o

Re: [FD] Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege

2016-01-11 Thread Douglas Held
to > fulldisclosure@seclists.org > ... > Message: 10 Date: Fri, 8 Jan 2016 14:32:51 +0100 From: "Stefan Kanthak" To: Cc: Subject: [FD] Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) codeexecutio

[FD] Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege

2016-01-08 Thread Stefan Kanthak
Hi @ll, the executable installers "TrueCrypt Setup 7.1a.exe" and TrueCrypt-7.2.exe load and execute USP10.dll, RichEd20.dll, NTMarta.dll and SRClient.dll from their "application directory". For software downloaded with a web browser the application directory is typically the user's "Downloads" di