This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author steve.dower
Recipients anandbhat, chrullrich, eryksun, jkloth, mhammond, paul.moore, steve.dower, tim.golden, zach.ware
Date 2016-07-04.22:13:58
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1467670438.59.0.923609565703.issue27410@psf.upfronthosting.co.za>
In-reply-to
Content
It's not even that the risk is low, it's that we can't actually fix it. There are zero explicit DLL loads in the installer (either the part we own or the third-party core) that are insecure, and the four DLLs referenced by the third-party core executable that are not listed as KnownDLLs are Windows system DLLs that could be used by any downloaded executable - in particular installers, which are most likely to show up in a downloads folder.

If a user is not knowledgeable enough to avoid "accidentally" downloading a file from a website, is not perceptive enough to notice an unexpected download, and/or is not paranoid enough to run installers from their own directory, they are going to be affected by this design decision in the operating system through some other installer.

We are already more secure than most, since we don't elevate by default. The 7-zip installer (which just happened to be first in my downloads folder) is more vulnerable to this, in that it will load version.dll from the downloads folder and execute code as Administrator. We will only run it as the current user, which is certainly a vector to start executing code, but it's not one that we can possibly close off.

If someone wants to report this flaw to the Microsoft security team, they can consider changing Windows to add these DLLs to the KnownDLLs list and ensure that the system's version is always loaded. The most we can do is publish an article for paranoid people to protect themselves (which I am not volunteering to write).
History
Date User Action Args
2016-07-04 22:13:58steve.dowersetrecipients: + steve.dower, mhammond, paul.moore, tim.golden, jkloth, zach.ware, eryksun, chrullrich, anandbhat
2016-07-04 22:13:58steve.dowersetmessageid: <1467670438.59.0.923609565703.issue27410@psf.upfronthosting.co.za>
2016-07-04 22:13:58steve.dowerlinkissue27410 messages
2016-07-04 22:13:58steve.dowercreate