由于 JavaScript 没有太多权限,病毒如何通过浏览器进入 PC?

发布于 2024-08-07 13:53:10 字数 97 浏览 4 评论 0原文

我想知道浏览器如何允许病毒传播到我们的计算机。我们收到的响应是文本响应。响应中唯一可执行的东西是 JavaScript,它没有太多权限,是什么让浏览器倾向于将某些文件传递到计算机?

I would like to know how browser allow viruses to pass through to our computers. Response we receive is a text response.. Only executable thing in the response is JavaScript which does not have much privileges, what makes browser favor certain files to be passed to computer?

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(4

臻嫒无言 2024-08-14 13:53:10

简短的列表:

  1. 浏览器插件。一般来说,ActiveX* 尤其是 Flash 因存在漏洞而臭名昭著。
  2. 缓冲区溢出。以特定方式形成 HTML 页面或 Javascript 可以将您想要的任何内容写入内存......然后可以导致远程执行。
  3. 其他错误。我记得过去有一些错误,浏览器可能会被欺骗将文件下载到已知位置,然后执行它们。

*Google 正在努力通过 Native Client 将这种特殊漏洞扩展到其他浏览器。

The short list:

  1. Browser plugins. ActiveX* in general and Flash in particular are notorious for having holes.
  2. Buffer overflows. Forming either HTML pages or Javascript in a specific way can lead to being able to write anything you want into memory... which can then lead to remote execution.
  3. Other errors. I recall bugs in the past where the browser could be tricked into downloading files into a known location, then execute them.

*Google is working on expanding this particular kind of hole to other browsers with Native Client.

携君以终年 2024-08-14 13:53:10

ActiveX 控件之类的东西允许在本地计算机上以基本完全的权限执行本机代码。大多数病毒通过未修补的浏览器中的已知安全漏洞进行传播,并且不直接使用 JavaScript。

Things like ActiveX controls allow native code to be executed on local machines with essentially full privileges. Most viruses propagate through known security holes in unpatched browsers and don't use Javascript directly.

贩梦商人 2024-08-14 13:53:10

浏览器错误和错误配置可能会导致本应位于“Internet”(安全)安全区域的站点执行代码,就好像它们是受信任的一样。然后他们可以使用 ActiveX 组件来安装恶意软件。

Browser bugs and misconfiguration can allow sites that should be in the "Internet" (secure) security zone execute code as if they were trusted. They can then use ActiveX components to install malware.

夏日浅笑〃 2024-08-14 13:53:10

利用软件错误。通常,在渲染图像、解释 html/css/javascript、加载 ActiveX 组件或 Flash 文件时。

一旦漏洞被利用,程序就会将“shell 代码”(一大块本机编译代码)注入到进程内存中以供执行。

Exploiting software bugs. Commonly, when rendering images, interpreting html/css/javascript, loading ActiveX components or Flash files.

Once a bug is exploited, the procedure is to inject "shell code" (a chunk of native compiled code), into the process memory to get executed.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文