[17412] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Windows (me) printer sharing vulnerability

daemon@ATHENA.MIT.EDU (Slawek)
Mon Oct 30 02:19:31 2000

MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-ID:  <009701c0405f$0ae7ad40$0201a8c0@telsatgp.com.pl>
Date:         Fri, 27 Oct 2000 23:44:11 +0200
Reply-To: Slawek <sgp@TELSATGP.COM.PL>
From: Slawek <sgp@TELSATGP.COM.PL>
To: BUGTRAQ@SECURITYFOCUS.COM

oops, sorry for answering to my own post


Friday, October 27, 2000 2:15 PM +0200, Slawek wrote:
> Every VxD placed in SYSTEM\vmm32 is automatically loaded and executed on
> system bootup.


It's not the way I've said here. I just remembered bootstrap VxD loader
cound be abused and it could, in fact, but not that way.


Every VxD that is mentioned in the registry (in some place, don't care where
for now) is loaded at bootstrap, but some of them are placed in VMM32.VxD

If a VxD is present is SYSTEM\vmm32 and in VMM32.VxD then system loads it
from SYSTEM\vmm32

It is not marked in the registry if the file should be loaded from a
separate file or from the VMM32.VxD


So we just need to make a copy of one of the system's VxDs from VMM32.VxD
and place it's trojaned version in SYSTEM\vmm32


Now I hope I'm correct,
Slawek

home help back first fref pref prev next nref lref last post