[5209] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Active X exploit.

daemon@ATHENA.MIT.EDU (Alan Cox)
Wed Aug 27 19:55:00 1997

Date: 	Wed, 27 Aug 1997 21:25:23 +0100
Reply-To: Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
From: Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
X-To:         paulle@MICROSOFT.COM
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <28347281A2B5CF119AB000805FD4186603B6F421@RED-77-MSG.dns.microsoft.com> from "Paul Leach" at Aug 26,
              97 04:55:47 pm

> What ActiveX doesn't have is a sandbox. That's different than saying
> that there's no security.
>
> ActiveX controls are _signed_ DLLs. You run the code if you trust the
> signer. If you do, you know that no one has tampered with the code since
> the signer signed it.
>
> That's more secure than what I buy at the store.

When sir, was the last time you walked into a store and every time you
looked at a package it automatically installed itself and ran ?

Signing things is good practice, and its one I'm pleased to see many
OS and product vendors adopting. Automatically running things that are
signed is a different matter.

Alan

home help back first fref pref prev next nref lref last post