Making Programs do what they're supposed to do.
Full Title: Backdooring File Type X or Making a program do what it’s supposed to do…
Original Posting: http://www.computerdefense.org/?p=110
You know what I’m fed up with… people making “security” related discoveries that aren’t really discoveries… they’re just common sense….
There are two guilty parties here that I’m extremely unhappy with: David Kierznowski and pdp. David actually made the news for his Backdooring PDFs blog…. pdp has had several Backdooring .Mov, Backdooring Flash, and Backdooring MP3s..
Let’s take a look at each of these..
* MOV - Movile Files - These files quite commonly open a link to the artists page or the movies page… They have the ability to open a link and that’s exactly what they are doing.
* MP3 - MPEG-1 Audio Layer 3 - This was my favourite one… this isn’t actually MP3s… it’s playlist files that can be named mp3.. So a whole lot of FUD over nothing. If an MP3 is 100 bytes and advertises itself as a full song… obviously it isn’t.. Again though, it’s a playlist file functioning as it is supposed to.
Everyone of these blog posts by both of them is nothing more than FUD generation. The fact that they invested so much time into these “vulnerabilities’ tells me something about the…. something I think everyone can come to on their own without me mentioning it.
Then there’s the issue of calling these backdoors… Do they know what a backdoor is… by definition this is not a backdoor
A backdoor in a computer system (or a cryptosystem, or even in an algorithm) is a method of bypassing normal authentication or obtaining remote access to a computer, while intended to remain hidden to casual inspection. The backdoor may take the form of an installed program (e.g., Back Orifice) or could be a modification to a legitimate program.
Consider this my security advisory — Programs do what they are coded to do… and you may not be aware of all their functionality.