Visual CASEL from Computer Power Solutions is a security product for Novell and Windows NT networks. It (among other things) provides the capability for limiting what a user on a network can execute based on "trusted filenames". Unfortunately, Visual CASEL places all of its trust in the name of the file _only_ instead of the absolute path and filename of the trusted files (that users can execute). Because of this, it is possible to run a malicious file which should not normally be executable if the filename is that of a "trusted file". An example follows (summarized example from xDeath's bugtraq post): A user copies pong.exe to his home directory and attempts to execute it (and is denied). The user renames pong.exe to write.exe and executes it. ("write.exe" is a trusted filename, as opposed to C:\windows\write.exe).
Visual CASEL from Computer Power Solutions is a security product for Novell and Windows NT networks. It (among other things) provides the capability for limiting what a user on a network can execute based on "trusted filenames". Unfortunately, Visual CASEL places all of its trust in the name of the file _only_ instead of the absolute path and filename of the trusted files (that users can execute). Because of this, it is possible to run a malicious file which should not normally be executable if the filename is that of a "trusted file". An example follows (summarized example from xDeath's bugtraq post): A user copies pong.exe to his home directory and attempts to execute it (and is denied). The user renames pong.exe to write.exe and executes it. ("write.exe" is a trusted filename, as opposed to C:\windows\write.exe).