
A Web application developer has uncovered a two-step process for <A HREF="http://www.eweek.com/article2/0,1895,2131595,00.asp?kc=EWKNLNAV051707STR3">exploiting Windows Vista's User Account Control,</A> essentially by having a Trojan piggyback on what could be a legitimate download.
Robert Paveza, a senior Web application developer with Terralever, a Web-based marketing company based in Tempe, Ariz., published details of the vulnerability in a paper titled "User-Prompted Elevation of Unintended Code in Windows Vista."
Paveza said in the paper that the vulnerability uses a two-part attack vector against a default Vista installation. The first step requires that malware called a proxy infection tool be downloaded and run without elevation. That software can behave as the victim expects it to while it sets up a second malicious payload in the background.