Re: [SC-L] Dark Reading - Application and Perimeter Security - Hacking the Vista Kernel - Security News Analysis

2006-07-26 Thread Pete Shanahan
Ken Buchanan wrote: >> I thought you had to have administrator access before you were > If you took Joanna to mean 'User privileges' when she said > 'user-mode', then you were mistaken. The opposite of user mode is > kernel mode. Yes, I think that would be my foot-in-mouth there. I misread the a

Re: [SC-L] Dark Reading - Application and Perimeter Security - Hacking the Vista Kernel - Security News Analysis

2006-07-25 Thread SC-L Subscriber Dave Aronson
Pete Shanahan [mailto:[EMAIL PROTECTED] writes: > I'm just wondering how flawed the implementation of the windows > paging model is that it would allow for this kind of breach. The > standard model I'm familiar with would simply flush the page from > memory, and would not keep a copy in the ex

Re: [SC-L] Dark Reading - Application and Perimeter Security - Hacking the Vista Kernel - Security News Analysis

2006-07-25 Thread Pete Shanahan
Hang on a minute, I thought you had to have administrator access before you were permitted raw access to the hard drive. The createfile documentation tells us that opening a physical disk / Volume requires that the caller must have administrative privileges. I'm just wondering how flawed the impl

[SC-L] Dark Reading - Application and Perimeter Security - Hacking the Vista Kernel - Security News Analysis

2006-07-25 Thread Kenneth Van Wyk
Here's an interesting article from Dark Reading regarding a software attack on the existing Vista beta:http://www.darkreading.com/document.asp?doc_id=99780&f_src=darkreading_section_296I noticed, in particular, that the attack is against a design weakness of Vista -- "The attack doesn't use your ty