Palladium and buffer over runs

Ben Laurie ben at algroup.co.uk
Fri Aug 30 07:44:36 EDT 2002


bear wrote:
> 
> On Thu, 29 Aug 2002, Frank Andrew Stevenson wrote:
> 
> 
>>What is there to prevent that one single undisclosed buffer overrun bug in
>>a component such as Internet Explorer won't shoot down the whole DRM
>>scheme of Palladium ? Presumably IE will be able to run while the machine
>>is in a trusted state, but if the IE can be subverted by injecting
>>compromising code through a buffer overrun, the security of DRM material
>>that is viewed in one window could be compromised through malicious code
>>that has been introduced through another browser window.
> 
> 
> It's my understanding of Palladium that it can enforce a separate
> data space for applications by creating a memory space which is
> encrypted with a key known to only that application.
> 
> Given that, I think a cracker could subvert IE normally, but that
> wouldn't result in any access to the protected space of any other
> applications.  And as long as IE is actually separate from your
> OS (if you're running it on your Mac, or under WINE from Linux,
> for example), it shouldn't give him/her access to anything
> inside the OS.

Apart from the content being accessed by IE, of course, which is quite 
likely to be the stuff that is supposed to be DRMed. Oh, but Palladium 
isn't for that. I forgot.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

Available for contract work.

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list