From: "FromTheRafters" erratic on
"Frank" <franklin.macintosh(a)gmail.com> wrote in message
news:4c0fd102-441f-4d08-85ea-8a7bd79810ae(a)b7g2000yqk.googlegroups.com...

[...]

I agree that the stick only contains data...aside from the fact that
the data changes in real time, however, malware can also reside in
data files e.g. macros, complicated graphics languages, etc.. My
actual knowledge about this is really sketchy, so I welcome any
perspectives on this.

***
You are correct that malware can exist as, or reside in, data filetypes.
Most malware, however, will exist as executable files.
***


From: Frank on
On May 9, 6:27 pm, "FromTheRafters" <erratic @nomail.afraid.org>
wrote:
> "Frank" <franklin.macint...(a)gmail.com> wrote in message
>
> news:4c0fd102-441f-4d08-85ea-8a7bd79810ae(a)b7g2000yqk.googlegroups.com...
>
> [...]
>
> I agree that the stick only contains data...aside from the fact that
> the data changes in real time, however, malware can also reside in
> data files e.g. macros, complicated graphics languages, etc..  My
> actual knowledge about this is really sketchy, so I welcome any
> perspectives on this.
>
> ***
> You are correct that malware can exist as, or reside in, data filetypes.
> Most malware, however, will exist as executable files.
> ***

Good to know....
From: David H. Lipman on
From: "Frank" <franklin.macintosh(a)gmail.com>

| I'm reaching way outside my area of experience here, but I recall for
| complex display languages (maybe HTML or some other languages for
| rendering content, postscript, PDF, TIFF, other bit-map languages), it
| is possible to exploit unbullet-proofed apps by coding up pathologies
| that cause (for example) buffer overruns. Like I said, I'm really
| reaching, but my impression is that the dividing line between data and
| programs can get blurry. Heck, even LaTeX is like programming. Based
| on that murky impression, I haven't distinguished between data and
| nondata for many years.

That's a roger.

Certain graphic file exploits could cause a Buffer Overflow condition with an Elevation of
Priveledges in GDI Plus.

Malicious PDF file exploits could cause a Buffer Overflow condition with an Elevation of
Priveledges in Adobe Reader/Acrobat and some other PDF viewers.

HTML is scipting laguage that can be outright malicious.

Nothing w/PostScript.

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


From: "FromTheRafters" erratic on
"Frank" <franklin.macintosh(a)gmail.com> wrote in message
news:c4b4c561-e155-4ef3-aced-b6b00c37d773(a)f13g2000vbm.googlegroups.com...
On May 9, 6:05 pm, "David H. Lipman" <DLipman~nosp...(a)Verizon.Net>
wrote:
> From: "Frank" <franklin.macint...(a)gmail.com>

[...]

> | I agree that the stick only contains data...aside from the fact that
> | the data changes in real time, however, malware can also reside in
> | data files e.g. macros, complicated graphics languages, etc.. My
> | actual knowledge about this is really sketchy, so I welcome any
> | perspectives on this.

[...]

> What are; "complicated graphics languages" ?

I'm reaching way outside my area of experience here, but I recall for
complex display languages (maybe HTML or some other languages for
rendering content, postscript, PDF, TIFF, other bit-map languages), it
is possible to exploit unbullet-proofed apps by coding up pathologies
that cause (for example) buffer overruns.

***
"Complicated graphics laguages" are not the only way that data can be
crafted maliciously. Any program that mishandles data in that manner can
be attacked. When you used that phrase I thought that you might be
referring to a certain graphics filetype that allows a custom error
handling routine to be be included - the SetAbortProc record in the WMF
filetype. This is not a graphics language, but a filetype's feature.

The data/code dichotomy does indeed get blurry sometimes.
***