The threats to our products April 1, 1999 By Loren Kohnfelder and Praerit Garg




Download 58,92 Kb.
bet12/15
Sana30.03.2021
Hajmi58,92 Kb.
#13786
1   ...   7   8   9   10   11   12   13   14   15
What products are susceptible?  All server products (operating systems, server applications, content and media services) are susceptible to privilege elevation threats. Because client systems are assumed to run in the context of the unprivileged user, they should not be trusted to not misuse the user's capabilities. This becomes even more important when a privileged user such as an administrator uses the client software. For this reason, privileged users are expected to run only "trusted clients."

Client operating systems, such as Windows 2000 Professional, are subject to the same threats as the server operating system. Because they do not have the concept of privileged vs. unprivileged mode, operating systems such as Win9x (which runs only in privileged mode) cannot be associated with such threats.

Because desktop applications typically depend on underlying operating systems to handle privileged vs. unprivileged user distinctions, privilege elevation threats are not applicable to desktop applications. But applications can create vulnerabilities that cause such attacks to be launched against the underlying operating system. Examples include supporting Trojans (such as Office macros) and disobeying the "least privileged" rule, where applications open files for more access than is necessary, thereby causing the system to be configured with lax security.



Download 58,92 Kb.
1   ...   7   8   9   10   11   12   13   14   15




Download 58,92 Kb.

Bosh sahifa
Aloqalar

    Bosh sahifa



The threats to our products April 1, 1999 By Loren Kohnfelder and Praerit Garg

Download 58,92 Kb.