"William" <starrwarz@g_~-clothes-~_m~more_clothes~ail.com> wrote in message
news:70Vkh.40916$wc5.11798@newssvr25.news.prodigy. net...
> On 12/28/2006 10:10 AM, something possessed Alun Jones to write:
>> "William" <starrwarz@g_~-clothes-~_m~more_clothes~ail.com> wrote in
>> message news:5Qnkh.7472$yC5.5798@newssvr27.news.prodigy.ne t...
>>> Not necessarily. If you're just using it to illegally download music
>>> and videos (not program executables), and you're careful about how you
>>> play these (I wouldn't rely on Windows to launch them, for example, but
>>> load them in Winamp, and don't let Winamp connect to Internet), than
>>> you're more or less safe.
>>
>> Right, because Winamp has never had any vulnerabilities that can be
>> exploited by badly formatted data.
>
> I didn't recommend Winamp because it was invulnerable, but simply because
> its not Integrated into the OS, so that if it goes bad, the whole OS
> doesn't suffer.
It does if you're running as an administrator account.
Windows (as with all computer systems I'm aware of) cannot distinguish
between the user, and programs run on that user's behalf. If you, the user,
run Winamp, and it loads a data file that causes execution through
exploiting a buffer overflow, the malware inside of that data file can do
absolutely anything to the system that you can do, with the exception of
anything that requires your actual physical presence.
So, if you're running as an administrator, it doesn't matter if you're
loading exploits into a program that's labeled "part of the OS", or one
that's labeled "third party shovelware", the exploit can do what it chooses.
The answer, then, is to run as a restricted user account. I do it all the
time - and when I do, my Internet Explorer runs as a restricted user account
too. Exploits in the apps I use can still do anything I can do, but the
damage is limited to my personal data, not the entire OS.
You can even run as an administrator while forcing IE to run as a restricted
user! [Search for "SAFER" and "SRP" and "Internet Explorer" for some
articles, or see
http://blogs.msdn.com/michael_howard...1/363985.aspx]
Note, though, that once you've downloaded and run a piece of malware,
whether it's an EXE or a buffer-overflowing MP3, that malware can do
everything you can do as a user.
> Additionally, while exploits may exist in Winamp when accessing
> questionable media locally stored, In order for any real damage to be done
> (i.e. a trojan downloader), Winamp would need to access the Internet (or
> maybe that reched program Internet Explorer).
Uh... no. Remember, Winamp - and any exploit it loads, as far as the
operating system is concerned, _is_ you.
It can start another program, it can inject itself into another program
you're already running, or it can combine the two.
> A good Firewall (like Kerio) should be able to prevent this from
> happening.
No, no it won't. Again, if you've told Kerio, or whatever, to allow _any_
program to access the outside world, that program can be compromised by code
you've run under any other program. So, your Winamp exploit can infect your
Internet Explorer in memory (not on disk, unless you have rights to that),
and pretend to be Internet Explorer in order to download its exploit - or,
quite honestly, it can simply start up IE to fetch the rest of its code.
But why would it need to do even that?
How big are the media files you're "sharing"? Way bigger than most damaging
code I could imagine. If you're downloading a video, or anything more than a
few seconds of sound, you won't notice the increase in size that you get by
adding some kind of malware.
>>
>> Oh. No, wait, actually it has. Several times.
>>
>> This is why the trend lately is to attack applications, rather than
>> operating systems - the operating system vendors are getting much better
>> at tracking and fixing problems, but many application vendors still have
>> their heads in the sand - and so do many users
> [snip]
> I understand your sentiment. Clearly, you support Microsoft, and that's
> fine. I don't agree with that sentiment, but everyone is entitled to
> their own opinion.
A => Z. Welcome to today's edition of "Jumping to Conclusions".
>> In the abstract sense, there is no dividing line between code and data -
>> data tells code where to go, and so acts as pseudo-code, in many cases.
> Again, requires Internet access to download the trojan. Media itself
> cannot contain the final executable code that infests a system with
> malware, all it can do is exploit vulnerabilities that allow the said
> malware to be installed.
If you believe that, you've got a long way to go. There really is no other
way to say it, but to note that you are completely wrong in that assertion.
Media itself can quite comfortably contain the exploit and whatever code is
going to execute after the exploit has taken over control of your system.
>>> Also, more than likely, the P2P proggie you used had its own malware
>>> (like Navaccel or something like that).
>>
>> Don't make the mistake of assuming that I'm talking about my own
>> experiences with P2P - I've simply seen too many machines infected where
>> the source of infection is traced to an overactive P2P exchanger.
> Which is why if someone is going to use P2P, they should be advised (as
> I'm trying to do) on how to use it safely. I'm not condoning such action,
> but its kind of analogous to making sure your teenager has protection, you
> don't want them to have to use it until they've matured, but they do, than
> it'll be there for them.
Best protection against catching malware from P2P is a membership at
Blockbuster, or a Netflix subscription.
Get your movies, and your tunes, from reputable sources who have a little
skin in the game should you get infected through them.
>>> Finally, some P2P proggies (such as Bittorrent) can be used safely (like
>>> for downloading Linux distros), since even though you're downloading
>>> from other computers, the tracker is administered by the Linux
>>> Distribution and, to my knowledge, it's not possible yet to alter a file
>>> or set of files once the tracker has already been posted without posting
>>> a new torrent tracker.
>>
>> I'm glad you put me at ease there - after all, the main Linux distros
>> have never been altered maliciously by hackers.
>>
>> Oh, wait, they have, haven't they.
>> http://www.linuxinsider.com/story/32240.html
>
> What's this got to do with altering a bittorrent stream. The results
> would have been the same rather bittorrent was used to download the distro
> or if it was downloaded from the server. In fact, in this case, the
> bittorrent tracker probably would have been the safer bet, since it was
> the server (and not the torrent) that was hacked.
The point is that you can only trust checksummed streams as much as you can
trust the person who created the file and the checksum in the first place.
Since most "sharing" of illegally copied material is done by people who
would like to remain anonymous, you're relying on trusting someone whom you
can't identify, and whose reputation (and reason for maintaining that
reputation) is unverifiable.
>> Cleaning a virus or trojan infection is only going to be effective if you
>> can plug whatever hole they got in through - whether it's a hole in your
>> behaviour, or in your apps, or in your OS. Even flattening and restoring
>> just means that the attacker gets another chance to try the same thing at
>> you, but this time on a system that's less cluttered with the debris of
>> other previous attacks.
>
> Agrees with you here. So, with that, I hope that if the OP ultimately
> decides to continue P2P, that he/she does so safely.
That requires only loading files with hashes generated by trusted
authorities. ("Authority" here means anyone with the right to say what is,
or isn't, a valid copy of a file.)
Downloading stolen movies and songs is not going to be safe. Not ever.
Alun.
~~~~


Reply With Quote