Reply 20 of 25, by MadHax
- Rank
- Newbie
Reasons DOSBox is an attractive attack vector:
* Blah blah illusion of containment starting to sound like a broken record.
* Modern virus scanner heuristics look for Windows API calls running in 32/64 bit environments, not for DOS/BIOS API calls running in 16 bit environments. Therefore it is easier to get a malicious program on to the target computer. While an antivirus running on the target system might be able to stop malware once it makes its way from DOSBox on to the host system, there is less of a chance of this happening. The user may not have an background antivirus running at all; they may selectively scan files using run-and-quit scanners or an online scan service.
Fun activity: go to http://www.dcee.net/Files/Antivir/ , download a bunch of DOS viruses, and put a dozen or so in a ZIP file. Go to http://www.virustotal.com, upload it, and watch how many of the antiviruses miss these decades old, well-known viruses. The ones that do detect them do it using definition keys, not heuristics.
* Games. DOSBox is a games platform providing access to a very large library of titles. How does malware spread? Idiot kids downloading infected games. As an added bonus, the IP holders have less interest in pursuing DCMA takedowns than they would with newer titles. The games are ancient and the companies that made them may not even exist anymore.
* People are becoming less familiar with DOS usage than they are with modern operating systems. It would be easier to convince a 12 year-old to do something stupid in DOS ("run this game"), something they've never used before, than something in Windows ("run this .vbs").
* Malware running within DOSBox can access files and the Internet as if it was DOSBox itself. It can evade Windows Firewall, or if a popup does happen, it would show up as DOSBox. A user would be more likely to approve it than a random program they did not know of. An antivirus would be more likely to miss programs downloaded this way than through a browser.
* The fact that DOSBox has never been audited for security. Most popular software available from the Internet is actively checked for security problems, so it's harder to exploit. What better attack vector than a fairly common program that has known problems that are never fixed?
wrote:However, what needs to be considered is how the functionality might be used in existing frontend and menu systems for non-malicious purposes.
Alright, now this is a legitimate argument and one that has me stumped. Maybe a whitelist in the configuration file to permit specific programs to access mounting? It would require anyone using them to retrofit their existing configs, which is a bit of a problem. I'm going to think about it.