lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 10 Feb 2016 20:29:27 +0100
From: "Securify B.V." <lists@...urify.nl>
To: fulldisclosure@...lists.org
Subject: Re: [FD] OLE DB Provider for Oracle multiple DLL side loading
 vulnerabilities

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
Microsoft released MS16-014 that fixes this vulnerability.


On 16-12-15 19:26, Securify B.V. wrote:
> ------------------------------------------------------------------------
> OLE DB Provider for Oracle multiple DLL side loading vulnerabilities
> ------------------------------------------------------------------------
> Yorick Koster, August 2015
>
> ------------------------------------------------------------------------
> Abstract
> ------------------------------------------------------------------------
> Multiple DLL side loading vulnerabilities were found in the OLE DB
> Provider for Oracle. These issues can be exploited by loading various
> OLE components as an embedded OLE object. When instantiating the object
> Windows will try to load the DLLs oci.dll, and ociw32.dll from the
> current working directory. If an attacker convinces the user to open a
> specially crafted (Office) document from a directory also containing the
> attacker's DLL file, it is possible to execute arbitrary code with the
> privileges of the target user. This can potentially result in the
> attacker taking complete control of the affected system.
>
> ------------------------------------------------------------------------
> See also
> ------------------------------------------------------------------------
> http://www.greyhathacker.net/docs/OfficeDLLhijacking.zip
> https://securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html 
>
>
> ------------------------------------------------------------------------
> Tested versions
> ------------------------------------------------------------------------
> This issue was successfully verified on Windows 7 + Office 2007 32-bit,
> Windows Vista + Office 2010 32-bit, Windows 7 + Office 2013 32-bit.
>
> ------------------------------------------------------------------------
> Fix
> ------------------------------------------------------------------------
> There is currently no fix available.
>
> ------------------------------------------------------------------------
> Details
> ------------------------------------------------------------------------
> https://www.securify.nl/advisory/SFY20150806/ole_db_provider_for_oracle_multiple_dll_side_loading_vulnerabilities.html 
>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists