Services are started with the system privileges. If somebody is able to
place that .exe in the specified directory, then it will be executed on
service start. So, yes, I too agree with Asif that it is an important issue
and should be fixed in the code at the earliest.


On Thu, Oct 31, 2013 at 11:14 AM, Asif Naeem <anaeem...@gmail.com> wrote:

> On Thu, Oct 31, 2013 at 10:17 AM, Amit Kapila <amit.kapil...@gmail.com>wrote:
>
>> On Tue, Oct 29, 2013 at 12:46 PM, Naoya Anzai
>> <anzai-na...@mxu.nes.nec.co.jp> wrote:
>> > Hi Sandeep
>> >
>> >> I think, you should change the subject line  to "Unquoted service path
>> containing space is vulnerable and can be exploited on Windows" to get the
>> attention..  :)
>> > Thank you for advice!
>> > I'll try to post to pgsql-bugs again.
>>
>> I could also reproduce this issue. The situation is very rare such
>> that an "exe" with name same as first part of directory should exist
>> in installation path.
>>
>
> I believe it is a security risk with bigger impact as it is related to
> Windows environment and as installers rely on it.
>
>
>> I suggest you can post your patch in next commit fest.
>
>
> Yes. Are not vulnerabilities/security risk's taken care of more urgent
> bases ?
>
>
>> With Regards,
>> Amit Kapila.
>> EnterpriseDB: http://www.enterprisedb.com
>>
>
>


-- 
Sandeep Thakkar


Phone: +91.20.30589505

Website: www.enterprisedb.com
EnterpriseDB Blog: http://blogs.enterprisedb.com/
Follow us on Twitter: http://www.twitter.com/enterprisedb

Reply via email to