Why would someone want to surreptitiously install a RAS administration tool on their machine?
The point wouldn’t be to install a RAS tool, but rather to use the vulnerability to gain privileges on the machine. The DLL specified in this RAS Administration key runs with LocalSystem privileges – that is, it runs as part of the operating system on the local machine. By specifying code of her choice via the RAS Administration key, the malicious user could make that code run as part of the operating system. It’s important to note, though, that there would be some constraints on the code. The malicious user would need to install a DLL whose entry points matched those of a bona fide RAS administration tool. This means that the code would need to be developed especially for this purpose. What could a malicious user use this vulnerability to do? If a malicious user exploited this vulnerability, she could gain complete control over the local machine. She could do literally anything she wanted on the machine, from changing data, to reformatting the hard drive, to installing new system comp
Related Questions
- Does The Backup Safe Job Manager upgrade the installation of Java on a client machine, or does it install a separate copy for it own use?
- Can I install RAD Studio 2010 on a machine with previous versions of RAD Studio, Delphi or C++Builder on it?
- Can I install more than one copy of DB Visual ARCHITECT for IntelliJ IDEA on the same machine?