CharlieTester wrote:QUOTE (CharlieTester @ Aug 23 2010, 09:50 PM) the key for the scramble is some of the version info for the client binary - this limits only developers (or @#$%@#s that can build the code) to be able to, at most, set your cloud input map to something you don't expect. that's the worse that can happen - a custom build is a prerequisite. and u have to match the version info which is unique to a release - still a PITA and the worst that could happen is you have to re-config your controls again (arg!)
Uh, and what prevents me from extracting the version information from the officially released build?
Yeah some coding experience is required to perform this exploit, your average anarchist won't mess up any input maps. I would consider this pretty harmless if it was not for the fact that the input map loading code was:
- written by Microsoft
- written in 199x
- never was intended to accept data downloaded from the net
- never went through any security review
As far as I can currently tell, anyone with some coding skills can extract the version info from the client binary, scramble someone else's callsign, upload some buffer-overload-exploiting binary to the cloud, and wait for the victim to press that load button. Mission achieved: full control over the victim's computer.
Sure, given how small the Alleg community is, it's very unlikely that anyone has both the skills and will to pull this off. But it's an unnecessary risk.
Sorry if this stuff is a bit far-fetched, but I'm paranoid when it comes to network security.