Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Remote code execution


  • Please log in to reply
3 replies to this topic

#1 Xirw

Xirw

  • Members
  • 105 posts
  • OFFLINE
  •  
  • Local time:06:46 AM

Posted 17 October 2014 - 12:52 AM

Can somebody explain this a little better for me. Say for example you have something like the windows gadgets that can be exploited using remote code. Can the gadgets still be exploited if you do not visit any malicious websites or install any malware executables?

And if they still can,then how?

BC AdBot (Login to Remove)

 


#2 Kilroy

Kilroy

  • BC Advisor
  • 3,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Launderdale, MN
  • Local time:04:46 AM

Posted 19 October 2014 - 09:38 PM

Remote code means what it says.  The application can be exploited and run code from a remote source.  The extent of the remote code vulnerability will vary by vulnerability.  Some may only need the device connected to a public IP address, some may need something more.

 

This was the best I could find, in a quick search, about the Windows gadget vulnerability.  Basically "Microsoft has said that it has discovered that some Vista and Win7 gadgets don’t adhere to secure coding practices and should be regarded as causing risk to the systems on which they’re run."  So it isn't gadgets in particular, just that a "bad" gadget could be created and there isn't a lot in place in the gadget portion of Windows that protects you against it.



#3 Xirw

Xirw
  • Topic Starter

  • Members
  • 105 posts
  • OFFLINE
  •  
  • Local time:06:46 AM

Posted 23 October 2014 - 12:45 AM

Thanks for the reply it helped me understand it a little better.



#4 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:46 AM

Posted 24 October 2014 - 03:27 PM

Can the gadgets still be exploited if you do not visit any malicious websites or install any malware executables?

And if they still can,then how?

 

It depends on what the gadget does and if it contains bugs that are exploitable.

 

For example, if the gadget reads your e-mail AND is vulnerable to an exploit in the e-mail, then yes, it is possible, in theory.

But that doesn't mean it is likely.

 

It all depends on the gadgets.


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Senior Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2019
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users