What do these threats have in common?




Download 58,92 Kb.
bet11/15
Sana30.03.2021
Hajmi58,92 Kb.
#13786
1   ...   7   8   9   10   11   12   13   14   15
What do these threats have in common?

  • Improperly gaining unrestricted rights (becoming a "administrator").

  • Running untrusted data as native code in a trusted process, such as by buffer overrun.

  • Spoofing identity to gain access to resources not otherwise available.

Examples

  • Buffer overruns, such as handcrafted stacks in a GetAdmin attack, causing user code to be executed at an elevated privilege and thereby compromising the entire operating system's trusted computing base.

  • The ability to run executables without the (privileged) user's consent can allow the perpetrator to perform privileged operations, such as making himself or herself a privileged user.

  • Rogue OCX/ActiveX control with malicious code.

  • Missing impersonation in the server, or client-side impersonation such as the one leveraged by SecHole.exe, causes the server to do privileged operations on behalf of an unauthorized user, thereby effectively raising the privilege level of the malicious user.

  • Missing or improper access checks in the security subsystem itself can result in privilege elevation. For example, if group membership of administrators was updated without an access check, it would allow an unauthorized user to become a system administrator.


Download 58,92 Kb.
1   ...   7   8   9   10   11   12   13   14   15




Download 58,92 Kb.

Bosh sahifa
Aloqalar

    Bosh sahifa



What do these threats have in common?

Download 58,92 Kb.