{"id":32403,"date":"2006-02-03T10:00:00","date_gmt":"2006-02-03T10:00:00","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/oldnewthing\/2006\/02\/03\/you-cant-even-trust-the-identity-of-the-calling-executable\/"},"modified":"2006-02-03T10:00:00","modified_gmt":"2006-02-03T10:00:00","slug":"you-cant-even-trust-the-identity-of-the-calling-executable","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/oldnewthing\/20060203-00\/?p=32403","title":{"rendered":"You can&#039;t even trust the identity of the calling executable"},"content":{"rendered":"<p>A while back, I demonstrated that <a href=\"http:\/\/blogs.msdn.com\/oldnewthing\/archive\/2004\/01\/01\/47042.aspx\"> you can&#8217;t trust the return address<\/a>. What&#8217;s more, you can&#8217;t even trust the identity of the calling executable. I&#8217;ve seen requests from people who say, &#8220;I want to check whether I&#8217;m being called from MYAPP.EXE. I&#8217;m going to make a security decision based on the result.&#8221;\n Although you can do this, all it does is give you more rope.<\/p>\n<p> Even if you are convinced that you&#8217;re being called from the expected application, you aren&#8217;t any safer. An attacker can inject code into that process (say, via a global hook) and you will foolishly trust it. In the same way that you shouldn&#8217;t trust who you&#8217;re talking to on the phone based solely on the caller ID. Somebody could have broken into the caller&#8217;s house and made the call from that phone. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>A while back, I demonstrated that you can&#8217;t trust the return address. What&#8217;s more, you can&#8217;t even trust the identity of the calling executable. I&#8217;ve seen requests from people who say, &#8220;I want to check whether I&#8217;m being called from MYAPP.EXE. I&#8217;m going to make a security decision based on the result.&#8221; Although you can [&hellip;]<\/p>\n","protected":false},"author":1069,"featured_media":111744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[25],"class_list":["post-32403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-oldnewthing","tag-code"],"acf":[],"blog_post_summary":"<p>A while back, I demonstrated that you can&#8217;t trust the return address. What&#8217;s more, you can&#8217;t even trust the identity of the calling executable. I&#8217;ve seen requests from people who say, &#8220;I want to check whether I&#8217;m being called from MYAPP.EXE. I&#8217;m going to make a security decision based on the result.&#8221; Although you can [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/32403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/users\/1069"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/comments?post=32403"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/32403\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media\/111744"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media?parent=32403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/categories?post=32403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/tags?post=32403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}