Re: ... Tiny Personal Firewall ...

From: Scott Nursten (scottnat_private)
Date: Fri Mar 01 2002 - 08:55:40 PST

  • Next message: hologram: "[H20020304]: Remotely exploitable format string vulnerability in ntop"

    Not being au fiat with Windows programming etc., I was wondering if this was
    standard practice? Surely if the workstation is locked it's supposed to stop
    all I/O? 
    
    Isn't this also an OS related bug? No flames please, it's just a question.
    :) 
    
    Regards,
    
    Scott 
    -- 
    
    On 28/2/02 2:53 pm, "Andrew Barkley" <andrew.barkleyat_private> wrote:
    
    > Hi ...
    > 
    > 
    > Scanning hosts running the Tiny Personal Firewall (2.0.15a) on W2K
    > workstations that have been locked (ctl + alt + del)
    > 
    > The popup alert/dialogue jumps to the foreground, thus open to accept
    > permit/deny input from the local console, even when the workstations are
    > locked (ctl + alt + del).  Thus an untrusted individual whom has local access
    > to individuals workstations can scan a workstation/network, wait for the popup
    > alert dialogue and enter "permit" on unattended (locked workstations) without
    > the owners permission/knowledge, No need to first unlock (ctl + alt + del)
    > ...
    > 
    > 
    > CHEERS ...
    > 
    



    This archive was generated by hypermail 2b30 : Mon Mar 04 2002 - 23:59:02 PST