lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20110609135325.13569.qmail@securityfocus.com>
Date: 9 Jun 2011 13:53:25 -0000
From: robkraus@...utionary.com
To: bugtraq@...urityfocus.com
Subject: PDFill Insecure Library Loading


Vulnerability title: PDFill Insecure Library Loading

CVSS Risk Rating: 2.9 (Low)

Product: PDFill PDF Editor 8.0

Application Vendor: PlotSoft

Vendor URL: http://www.plotsoft.com

Public disclosure date: 6/9/2011

Discovered by: Jose Hernandez and Solutionary Engineering Research Team (SERT)

Solutionary ID: SERT-VDN-1008

Solutionary public disclosure URL: http://www.solutionary.com/index/SERT/Vuln-Disclosures/PDFill-Insecure-Library.html

Vulnerability Description: PDFill contains a Insecure Library Loading vulnerability. The libraries identified as being vulnerable are mfc70enu.dll and mfc80loc.dll. The vulnerability lies in the way Microsoft Windows loads DLLs. If applications load a library from a specific path and call that path implicitly, Microsoft Windows searches several default paths to find and load the library. A malicious attacker can create a malicious DLL with the same name and place it in a directory where Microsoft Windows searches by default. The application will load the malicious DLL and may result result in arbitrary code execution.

Affected software versions: 8.0

Impact: Successful exploitation allows local or remote arbitrary code execution.

Fixed in: Not Fixed

Remediation guidelines: Windows released several tools to be used as workarounds for this vulnerability, however, these tools alter basic windows functionality which may result in malfunctioning applications. Test all tools in a test environment before deployment in production environments. https://www.microsoft.com/technet/security/advisory/2269637.mspx http://blogs.technet.com/b/msrc/archive/2010/08/21/microsoft-security-advisory-2269637-released.aspx


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ