Skeeedunt
Platinum Member
Originally posted by: stash
Don't get me started on how much worthless security theater that is. In that case, the malware's job is even easier. Even if ZA is using a hash (I have no idea), it's useless, since the malware can bet the farm that a browser of some kind will be whitelisted.That (appears) to be how software firewalls like zone alarm and the like do it. Whenever a program gets updated, you get re-prompted to allow it access to the internet. (I assume it's a hash and not just a timestamp or something )
Now I think in Vista, if a malicious process piggybacked on iexplore to get through the Sooper Sekure outbound filtering firewall, it wouldn't be able to do much to the machine, because that process is still running at the lowest integrity level. But it should still be able to send whatever it wants out through your firewall.
Sorry, I wasn't really trying to comment on firewalls, other than the fact that the hash checking they might do doesn't really add any great inconvenience.
It is a good point, though, that certain whitelisted applications might contain vulnerabilities that would allow an unprivileged app to escalate privileges. I assume that would be the exception rather than the rule, though. I could see how IE could be used to transmit arbitrary information over the internet, but could spyware use random whitelisted apps to gain admin rights with any degree of certainty?