Wanna Cry Escapes under wine

For discussions about security.
Post Reply
Message
Author
Robert123
Posts: 362
Joined: Fri 20 May 2016, 05:22
Location: Pacific

Wanna Cry Escapes under wine

#1 Post by Robert123 »

Devuan Linux, Stardust 013 (4.31) updated [url]https://archive.org/details/Stardustpup013glibc2.10[/url]
s57(2018)barebone[url]https://sourceforge.net/projects/puppy-linux-minimal-builds/files/s57%282018%29barebones.iso/download[/url]

Sailor Enceladus
Posts: 1543
Joined: Mon 22 Feb 2016, 19:43

#2 Post by Sailor Enceladus »

I imagine that Wine mounting Z:\ as / off the bat is kind of a security hazard, guessing you could probably just make a simple batch file that goes to Z:\mnt and tries to delete every folder starting with all sub-directories in sda1, sda2, home, etc.

User avatar
Burn_IT
Posts: 3650
Joined: Sat 12 Aug 2006, 19:25
Location: Tamworth UK

#3 Post by Burn_IT »

Well I have no sympathy for anyone deliberately running known nasties even under simulated environments.
Whether you like it or not there is ALWAYS a path between virtual machines and the real one it is running under - as there HAS to be to make resources available.
"Just think of it as leaving early to avoid the rush" - T Pratchett

step
Posts: 1349
Joined: Fri 04 May 2012, 11:20

#4 Post by step »

WineHQ recommend never to run wine as root. Of course that's inconvenient in Puppy land but it may be worth doing for frequent wine users. In Fatdog64 I run wine as user spot by default, and only allow running it as root for specific apps that I believe don't to pose a security risk.
[url=http://murga-linux.com/puppy/viewtopic.php?t=117546]Fatdog64-810[/url]|[url=http://goo.gl/hqZtiB]+Packages[/url]|[url=http://goo.gl/6dbEzT]Kodi[/url]|[url=http://goo.gl/JQC4Vz]gtkmenuplus[/url]

Post Reply