Problems might occur if DBSAs or OSAs execute untrusted software. Untrusted software can use the privileges of the DBSA or the OSA to perform actions that bypass or disable the security features of the product or that grant inappropriate DAC access privileges.
The primary countermeasure to this vulnerability is to make sure that DBSAs and OSAs do not execute software of unknown or untrusted origin. We further recommend that the operating-system access controls protect all software that DBSAs and OSAs execute against unauthorized modification.
Home | [ Top of Page | Previous Page | Next Page | Contents | Index ]