翻訳と辞書
Words near each other
・ Shatt en-Nil
・ Shatt language
・ Shatt people
・ Shatt-e Badam
・ Shatta Wale
・ Shattak River
・ Shattari
・ Shatter
・ Shatter (comics)
・ Shatter (digital comic)
・ Shatter (EP)
・ Shatter (film)
・ Shatter (novel)
・ Shatter (song)
・ Shatter (video game)
Shatter attack
・ Shatter Cave
・ Shatter cone
・ Shatter Dead
・ Shatter Me
・ Shatter Me (album)
・ Shatter Me (song)
・ Shatter'd
・ Shatterday
・ Shatterday (book)
・ Shattered
・ Shattered (1921 film)
・ Shattered (1991 film)
・ Shattered (2004 TV series)
・ Shattered (2010 TV series)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Shatter attack : ウィキペディア英語版
Shatter attack
In computing, a shatter attack is a programming technique employed by crackers on Microsoft Windows operating systems to bypass security restrictions between processes in a session. A shatter attack takes advantage of a design flaw in Windows's message-passing system whereby arbitrary code could be injected into any other running application or service in the same session, that makes use of a message loop. This could result in a privilege escalation exploit.〔(【引用サイトリンク】 title=Exploiting design flaws in the Win32 API for privilege escalation. Or... Shatter Attacks - How to break Windows. )
== Overview ==
Shatter attacks became a topic of intense conversation in the security community in August 2002 after the publication of Chris Paget's paper titled, "Exploiting design flaws in the Win32 API for privilege escalation".〔
〕 The paper, which coined the term "shatter attack", explained the process by which an application could execute arbitrary code in another application. This could occur because Windows allows unprivileged applications to send messages to message loops of higher-privileged application - and some messages can have the address of a callback function in the application's address space as its parameter. If an attacker manages to put his own string into the memory of the higher-privileged application (say by pasting shellcode to an edit box) at a known location, they could then send WM_TIMER messages with callback function parameters set to point to the attacker's string.
A few weeks after the publication of this paper, Microsoft responded, noting that: "The paper is correct that this situation exists, and it does correctly describe its effect. ... Where the paper errs is in claiming that this is a flaw in Windows. In reality, the flaw lies in the specific, highly privileged service. By design, all services within the interactive desktop are peers, and can levy requests upon each other. As a result, all services in the interactive desktop effectively have privileges commensurate with the most highly privileged service there."

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Shatter attack」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.