lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <5671AC28.3020808@securify.nl>
Date: Wed, 16 Dec 2015 19:23:36 +0100
From: "Securify B.V." <lists@...urify.nl>
To: bugtraq@...urityfocus.com
Subject: Event Viewer Snapin multiple DLL side loading vulnerabilities

------------------------------------------------------------------------
Event Viewer Snapin multiple DLL side loading vulnerabilities
------------------------------------------------------------------------
Yorick Koster, August 2015

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
Multiple DLL side loading vulnerabilities were found in the Event Viewer
Snapin that ships with Windows. These issues can be exploited by loading
various COM components as an embedded OLE object. When instantiating
vulnerable object Windows will try to load the DLL elsext.dll from the
current working directory. If an attacker convinces the user to open a
specially crafted (Office) document from a directory also containing the
attacker's DLL file, it is possible to execute arbitrary code with the
privileges of the target user. This can potentially result in the
attacker taking complete control of the affected system.

------------------------------------------------------------------------
See also
------------------------------------------------------------------------
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6132
https://technet.microsoft.com/library/security/MS15-132
http://www.greyhathacker.net/docs/OfficeDLLhijacking.zip
https://code.google.com/p/google-security-research/issues/detail?id=514
https://securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully verified on Windows 7 + Office 2007 32-bit,
Windows Vista + Office 2010 32-bit, Windows 7 + Office 2013 32-bit.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
Microsoft released MS15-132 that fixes this vulnerability.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://www.securify.nl/advisory/SFY20150805/event_viewer_snapin_multiple_dll_side_loading_vulnerabilities.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ