A Windows 98 & ME forum. Win98banter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » Win98banter forum » Windows 98 » General
Site Map Home Authors List Search Today's Posts Mark Forums Read Web Partners

PDF exploits shown in this comparison as exceeding Flash based



 
 
Thread Tools Display Modes
  #71  
Old February 26th 10, 02:46 AM posted to microsoft.public.security.homeusers,microsoft.public.win98.gen_discussion
98 Guy
External Usenet User
 
Posts: 2,951
Default PDF exploits shown in this comparison as exceeding Flash based

FromTheRafters wrote:

I don't really consider DoS's to be a significant or credible
threat to anonymous end-users (what's the point?).


Well then, a DoS exploit is not an exploit to you?


To exploit something generally means to make some use of it.

When a computer is exploited, it means (in this context) that a third
party is or has gained some use or operational control over it.

DoS events and exploits are not (to my knowledge) used against the
average web-surfer, e-mail reader, home or soho user - but instead are
used against specific machines, servers, etc.

There are some exploits that have no function other than to cause
instability or crash a target system (ie- DoS). The use of such
"exploit" code in that situation will achieve some goal by the attacker,
but I question if it can be said that the target machine was actually
"exploited" in the process.

Until we see a functional example of an operable PDF exploit
AND payload for the Win-98/Acrobat-6 combination then we
can't be sure *if* there is a viable exploit in the first
place.


I suppose you have your own unique definition of payload then?


Where do I say that?

I'm just saying that there has not been any PDF exploit-code analysis
that I've ever seen where it was proved or shown that the exploit would
work on a win-98/acrobat-6 system. And going further, I'm not aware of
an appropriate payload / shellcode that has ever circulated in the wild
to go along with such an exploit.
  #72  
Old February 26th 10, 03:18 AM posted to microsoft.public.security.homeusers,microsoft.public.win98.gen_discussion
FromTheRafters[_3_]
External Usenet User
 
Posts: 67
Default PDF exploits shown in this comparison as exceeding Flash based

"98 Guy" wrote in message ...
FromTheRafters wrote:

I don't really consider DoS's to be a significant or credible
threat to anonymous end-users (what's the point?).


Well then, a DoS exploit is not an exploit to you?


To exploit something generally means to make some use of it.


Exactly, but what you are exploiting is the vulnerability. You make use
of the vulnerability to affect a DoS.

When a computer is exploited, it means (in this context) that a third
party is or has gained some use or operational control over it.


It always starts with a DoS.

DoS events and exploits are not (to my knowledge) used against the
average web-surfer, e-mail reader, home or soho user - but instead are
used against specific machines, servers, etc.


That would be dDoS (distributed DoS) attacks.

There are some exploits that have no function other than to cause
instability or crash a target system (ie- DoS). The use of such
"exploit" code in that situation will achieve some goal by the
attacker,
but I question if it can be said that the target machine was actually
"exploited" in the process.


The vulnerability was exploited to do a DoS.

Until we see a functional example of an operable PDF exploit
AND payload for the Win-98/Acrobat-6 combination then we
can't be sure *if* there is a viable exploit in the first
place.


I suppose you have your own unique definition of payload then?


Where do I say that?


I inferred it from your evident need for coupling payload with exploit.

I'm just saying that there has not been any PDF exploit-code analysis
that I've ever seen where it was proved or shown that the exploit
would
work on a win-98/acrobat-6 system. And going further, I'm not aware
of
an appropriate payload / shellcode that has ever circulated in the
wild
to go along with such an exploit.


I can agree with that observation.


  #73  
Old February 26th 10, 03:18 AM posted to microsoft.public.security.homeusers,microsoft.public.win98.gen_discussion
FromTheRafters[_3_]
External Usenet User
 
Posts: 67
Default PDF exploits shown in this comparison as exceeding Flash based

"98 Guy" wrote in message ...
FromTheRafters wrote:

I don't really consider DoS's to be a significant or credible
threat to anonymous end-users (what's the point?).


Well then, a DoS exploit is not an exploit to you?


To exploit something generally means to make some use of it.


Exactly, but what you are exploiting is the vulnerability. You make use
of the vulnerability to affect a DoS.

When a computer is exploited, it means (in this context) that a third
party is or has gained some use or operational control over it.


It always starts with a DoS.

DoS events and exploits are not (to my knowledge) used against the
average web-surfer, e-mail reader, home or soho user - but instead are
used against specific machines, servers, etc.


That would be dDoS (distributed DoS) attacks.

There are some exploits that have no function other than to cause
instability or crash a target system (ie- DoS). The use of such
"exploit" code in that situation will achieve some goal by the
attacker,
but I question if it can be said that the target machine was actually
"exploited" in the process.


The vulnerability was exploited to do a DoS.

Until we see a functional example of an operable PDF exploit
AND payload for the Win-98/Acrobat-6 combination then we
can't be sure *if* there is a viable exploit in the first
place.


I suppose you have your own unique definition of payload then?


Where do I say that?


I inferred it from your evident need for coupling payload with exploit.

I'm just saying that there has not been any PDF exploit-code analysis
that I've ever seen where it was proved or shown that the exploit
would
work on a win-98/acrobat-6 system. And going further, I'm not aware
of
an appropriate payload / shellcode that has ever circulated in the
wild
to go along with such an exploit.


I can agree with that observation.


  #74  
Old March 19th 10, 11:23 AM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
JosephKK
External Usenet User
 
Posts: 1
Default PDF exploits shown in this comparison as exceeding Flash based

On Tue, 16 Feb 2010 23:47:24 +0100, "Jesper Ravn" wrote:

"MEB" skrev i meddelelsen
...

Excuse the cross post, however, Windows 9X [being left out of the
updating process] is just as vulnerable, if not more, than using
outdated applications in other OSs.

A basic explanation is found he
http://blogs.zdnet.com/security/?p=5473&tag=nl.e539

I suggest following the linked materials, and further research into the
various methods being used.
NOTE: that the use of "traffic optimization", which is running programs
to detect the available exploitable aspects in any given OS and/or
system, has increased, and is now the preferred method being used for
malicious activity distribution purposes.


Hello

To me it's just another fuzz story from a mainstream security magazine/blog,
that don't focus on a good prevention strategy.
All they care about is the scary headline and the same boring conclusion
about Firefox......

I really miss the word's "principle of least privilege" and "deny-all
policies" in the security debate today.

/Jesper


You could always switch to any other OS that properly supports the concept.
 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
New Adobe Reader Zero Day Exploits - New FireFox exploits MEB[_16_] General 28 May 5th 09 12:29 AM
Registry and system.dat comparison Bill P. General 9 August 27th 06 04:53 AM
Comparison of W98SE and ME? ms General 5 May 12th 05 06:58 PM
Win98 comparison [email protected] General 3 September 14th 04 10:01 AM
Spybot and DSO Exploits Alias General 2 September 7th 04 04:03 PM


All times are GMT +1. The time now is 04:03 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 Win98banter.
The comments are property of their posters.